Security and Compliance

Trust at Crypton

Companies trust Crypton every day with their sensitive documents and information. We take your trust seriously.

A-LIGN SOC 2 Badge

Crypton is proud to complete its SOC 2 examination with the guidance of third-party audit firm A-LIGN! This comprehensive, globally recognized attestation validates our commitment to critical security standards to protect and secure client data.

Learn more about the people, processes, and technology we use to keep our customers safe...

Security and Compliance Leadership
A dedicated security, compliance, and data privacy team works with leadership to ensure the business is advised and conducts secure, compliant, and ethical business.

Security Awareness Training and Testing
Onboarding training, quarterly training, ad-hoc training for situational threats, monthly social engineering tests with action for failures, and a 3 strikes policy that is enforced.

Tabletops
Simulations are conducted for a variety of scenarios to test the business response to business continuity, security, or other potential business-impacting scenarios.

Communications
Internal and external communications standards and channels are clearly defined.

Board Oversight
A board charter, quarterly meetings, and vetted members with experience in the SaaS and InfoSec space are current members.

Whistleblower
The company’s ethical values encourage accountability.

Cyber Insurance
We maintain multiple coverage types with adequate cover for business needs addressing things like ransomware, insider threats, and more.

Confidentiality Agreements
Employees are required to execute a confidentiality agreement on day one. Contractors, vendors, and partners are bound by Mutual Non-Disclosure Agreements.

Background Checks
These happen during the hiring process and annually on the anniversary date of the employee.

Role-based Access
Access is controlled based on role and any privileged access is handled with separate unique accounts