SECURITY
We are committed to
the integrity of your
firm’s data.
Our first priority is to make the closing process safe and secure. It’s critical to provide the appropriate measures to meet your firm’s security requirements. We start by ensuring you have the information you need to feel confident using our platform for your data.
We implement security best practices across our organization.
Data Encryption
SimplyAgree encrypts all data in transit and at rest, utilizing AES-256 data encryption in our databases. We enforce HTTP Strict Transport Security using a strong transmission protocol, key exchange and cipher.
Organizational security.
Security starts from the top down. Our Information Security Coordinator is a member of the management team. We maintain SOC 2 Type II compliance across our organization.
Custom infrastructure.
We can meet the infrastructure requirements of your firm or clients. SimplyAgree is deployable via a multi-tenant cloud, virtual private cloud or on-premises.
Seamless single sign on integration
-
— Maintain access controls from your source of truth with our SAML 2.0 SSO integration.
-
— Configurable with all major identity providers ("IdP") in 30 minutes or less.
-
— Just-in-time provisioning means you maintain access control with fewer resources.
-
— Customize and maintain 2FA or MFA requirements via your IdP.
Security isn't one measure. It’s all of them.
Infrastructure
The SimplyAgree service is hosted with industry-leading, ISO 27001 and SSAE Type II-certified service providers offering state-of-the-art physical protection for servers and infrastructure. All of our servers are hardened and have a base configuration image applied to ensure environment consistency.
Third-party testing
SimplyAgree conducts an annual SOC 2 Type II audit, performed by an accredited third-party auditor. We also complete independent penetration testing on our application and continuous vulnerability and infrastructure monitoring maintained by third-party security specialists.
Human resources
Each new employee is required to go through a background check and sign a confidential information and invention assignment agreement. All company employees are required to complete regular security training to ensure adherence to our policies and procedures and proactively identify cybersecurity threats.
Access control
We place strict controls over our employees’ access to customer data, using role-based access control methods that restrict privileged access to information resources based on the concept of least privilege. SimplyAgree also employs multi-factor authentication for all access to systems with highly sensitive data.
Audit trails
We maintain an extensive, centralized logging system tracking security, availability, access, and other related actions taken within SimplyAgree. Our development team provides administrators with clear change logs and the ability to control access to each of our repositories on a least-privileged basis.
Disaster recovery
We distribute production operations across separate physical locations to protect from loss of connectivity, power infrastructure, and other common location-specific failures. We regularly test and retain a full backup copy of production data in a remote location to ensure they can be successfully restored.
Get a closer look
Want to learn more about our commitment to safeguard our customers?
View our security whitepaper for an in-depth look at our policies and procedures to learn how we prioritize the security and trust of our customers.