Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Overview

Effectory information security and privacy measures are designed and implemented to protect the personal data of employees of customers, and survey results of customers.

Effectory is ISO 27001 and ISO 27701 certified for the above scope. Effectory is SOC 2 Type 2 audited successfully. A standardized vendor questionnaire according to CSA CAIQ is also available. A comprehensive whitepaper is available explaining in much more detail all Effectory technical and organizational measures to protect customer data. Below the documents, a selection of Effectory technical and organizational measures are explained at high-level.

Access to all these documents can be requested via this site using the provided buttons. It is also possible to optionally subscribe to updates of this page, including when new certificates or other documents are available. If you choose not to use this site, then please ask your Effectory sales consultant or Effectory customer success manager directly to obtain the desired documentation.

Compliance

GDPR Logo
GDPR
ISO 27001 Logo
ISO 27001
ISO 27001 SoA Logo
ISO 27001 SoA
ISO 27701 Logo
ISO 27701
SOC 2 Logo
SOC 2
SOC 3 Logo
SOC 3
Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Effectory is reviewed and trusted by

InternetSpiegelInternetSpiegel
SyngentaSyngenta
Jumbo SupermarktenJumbo Supermarkten
PostNLPostNL
SchipholSchiphol
bol.combol.com
ANWBANWB
MenzisMenzis
Hogeschool UtrechtHogeschool Utrecht
AchmeaAchmea
RijnstateRijnstate
Noordwest ZiekenhuisgroepNoordwest Ziekenhuisgroep
BDO NederlandBDO Nederland
München KlinikMünchen Klinik
eddingedding
TRUMPFTRUMPF
RitualsRituals
13 Documents
Pentest Report
Security Whitepaper
SOC 2 Report
SOC 3 Report
Vulnerability Assessment Report
ISO 27001
ISO 27001 SoA
ISO 27701
SOC 2
SOC 3
CAIQ

Risk Profile

Data Access LevelRestricted
Impact LevelLow
Critical DependenceNo
See more

Product Security

Role-Based Access Control
Audit Logging
Integrations
See more

Reports

Pentest Report
SOC 2 Report
SOC 3 Report
See more

Self-Assessments

CAIQ

Data Security

Access Monitoring
Backups Enabled
Encryption-at-rest
See more

App Security

Bug Bounty
Code Analysis
Software Development Lifecycle
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Azure
BC/DR
Separate Production Environment

Endpoint Security

Disk Encryption
DNS Filtering
Endpoint Detection & Response
See more

Network Security

Data Loss Prevention
DNSSEC
Firewall
See more

Corporate Security

Email Protection
Employee Training
HR Security
See more

Security Grades

Qualys SSL Labs
My Effectory
A+
Survey questionnaires
A+