Privacy is our policy
Security is at the core of Dashworks, and at the forefront of everything we do to make your company's knowledge searchable — by only the people you choose. Our advanced, bank-level security goes past just being compliant to ensure that all your data remains protected and private.
Private by design
Discovery that adapts to you. With an industry-leading semantic engine, Dashworks searches not only titles, but also the content and metadata within each file. It’s not just keyword search. It’s personalized discovery that acclimates to your role and coworkers, and improves with usage.
Built by experts to be compliant, secure, and private from ground up.
SOC-2 Type 2 Compliant
Dashworks has met the rigorous requirements for managing customer data required by AICPA SOC. We're SOC-2 Type 2 compliant for five trust service principles: security, availability, processing integrity, confidentiality, and privacy. If you'd like to request our SOC report, please contact us.
We are committed to GDPR compliance and offer several data portability and management tools. Please contact us to request information about our practices, sub-processors, and our Data Processing Agreement.
All data sent to or from Dashworks is encrypted using TLS, and all customer data is encrypted in transit and at rest using AES-256.
Secure Infrastructure Provider
All data is stored in physically secure AWS facilities that include 24/7 on-site security, camera surveillance, and more. All customer data is hosted in data centers that are SOC 2 Type 2, ISO 27001, and HITRUST compliant.
Rigorous Access Control and Single Sign On
Dashworks leverages your existing SSO provider for authentication and provides out-of-the-box MFA support. With Dashworks, you can only access data that you already have permission to access in the source application. Permission changes in the source applications are automatically reflected in Dashworks.
Dashworks undergoes annual penetration tests by leading third-party experts.
Data Redundancy and Resiliency
Dashworks' infrastructure has been designed to be fault tolerant. All databases operate in a cluster configuration and the application tier scales using load balancing technology that dynamically meets demand.
Server Security and Monitoring
All servers are configured using a documented set of security guidelines and images are managed centrally. Changes to the company’s infrastructure are tracked, and security events are logged appropriately.
Senior IT Manager, Endeavor