Updated April 29, 2022
Shape Software Inc. (“Shape” or “Shape Software”) and our affiliates take security very seriously and have developed a comprehensive set of practices, technologies and policies to help ensure your data is secure. This document outlines some of our providers mechanisms and processes we have implemented to help ensure that your data is protected. Our security practices are based on tier of service selected by our customer and are grouped in four different areas: Physical Security; Network Security; People Processes and Redundancy and Business Continuity.
Our providers data-centers are hosted in some of the most secure facilities available.
The security team and infrastructure helps protect your data against the most sophisticated electronic attacks. The following is a subset of our network security practices.
Providers data center infrastructure is not just technology, but a disciplined approach to processes. This includes policies about escalation, management, knowledge sharing, risk, as well as the day to day operations.
The process is designed to protect your data and security even in times of system failures.