Enterprise security.
Built from day one.
CheckSammy is trusted by Fortune 500 companies to handle sensitive operational and sustainability data. Security isn't a feature—it's how we build.
Annual audit of security controls
EU data protection compliance
California privacy compliance
Healthcare data handling
How we protect your data
Defense in depth across every layer of our platform.
Data Encryption
All data encrypted at rest (AES-256) and in transit (TLS 1.3). Customer data isolated by tenant.
- AES-256 encryption at rest
- TLS 1.3 in transit
- Tenant data isolation
- Encrypted backups
Access Control
Enterprise SSO, role-based access, and audit logging for complete visibility into who accessed what.
- SAML 2.0 / OIDC SSO
- Role-based access control
- Multi-factor authentication
- Complete audit logging
Infrastructure Security
Enterprise-grade infrastructure with 99.9% uptime SLA, automated backups, and disaster recovery.
- 99.9% uptime SLA
- Daily automated backups
- Disaster recovery
- DDoS protection
Security practices
Our commitment to security is ongoing and comprehensive.
Secure Development
- Code review for all changes
- Static analysis and SAST
- Dependency vulnerability scanning
- Regular penetration testing
Operational Security
- 24/7 monitoring and alerting
- Incident response procedures
- Security awareness training
- Background checks for employees
Data Handling
- Data classification policies
- Retention and deletion controls
- Right to erasure compliance
- Data processing agreements
Need security documentation?
We're happy to provide security questionnaire responses, SOC 2 reports, data processing agreements, and other documentation required for your vendor assessment process.
Request Security Documentation
Contact our security team to request documentation for your vendor assessment.
Contact Security TeamOr email directly: security@checksammy.com