Security Practices

Updated April 29, 2022

Table of Contents

Shape Software Inc. (“Shape” or “Shape Software”) and our affiliates take security very seriously and have developed a comprehensive set of practices, technologies and policies to help ensure your data is secure. This document outlines some of our providers mechanisms and processes we have implemented to help ensure that your data is protected. Our security practices are based on tier of service selected by our customer and are grouped in four different areas: Physical Security; Network Security; People Processes and Redundancy and Business Continuity.

Physical Security

Our providers data-centers are hosted in some of the most secure facilities available.

Network Security

The security team and infrastructure helps protect your data against the most sophisticated electronic attacks. The following is a subset of our network security practices. 

Staff Processes

Providers data center infrastructure is not just technology, but a disciplined approach to processes. This includes policies about escalation, management, knowledge sharing, risk, as well as the day to day operations.

Redundancy

The process is designed to protect your data and security even in times of system failures. 

Get in Touch

Our team of experts are here to help! Call our sales line at (888) 762-7211

Download

Contact Sales