Data Security

TheLoops protects your data

TheLoops is trusted with the most sensitive customer information of leading organizations. We specialize in industries with sophisticated security requirements— financial services, network services, IaaS and PaaS. TheLoops invests in security technologies, operations, and external audits to ensure our systems and processes are their best.

TheLoops protects your data

TheLoops is trusted by

PayPal Bloomreach Blueshift Equinix ServiceRocket Upstart UserTesting

Secure by design

TheLoops’ architecture is secure by design. While operating as a cloud software-as-a-service (SaaS) platform, all customer data can be stored on your company’s infrastructure. In addition, all data is encrypted at Rest and protected by TLS in transit.

SOC 2 Certified

SOC 2 Certified

In accordance with the AICPA's AT-C 315 Compliance Attestation and the Trust Service Criteria for Security, TheLoops is SOC 2 Type 2 compliant. Achieving this standard with an unqualified opinion serves as third-party industry validation that TheLoops provides enterprise-level security for our customer’s data.

Hippa Compliant

Hippa Compliance

Prescient Assurance, LLC confirms TheLoops compliance with the HIPAA framework (HIPAA Security, Privacy, and Breach Notification Rules) in accordance with the AICPA's AT-C 315 Compliance Attestation and the Trust Service Criteria for Security.

Single Sign-On

Single Sign-On

TheLoops provides access controls at every layer. It authenticates users using SSO rather than requiring them to enter additional login credentials. You can authenticate through Okta, Google and Microsoft.

TheLoops commitment to security

SOC 2 Certified

Permissions & Access

We enable granular permission levels within TheLoops to be set for your teammates. Permission can be set to include app settings, integrations, user data and financial data.

Amazon Web Services

Vulnerability Scanning

TheLoops utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.

Single Sign-On

Incident Response

TheLoops has policies and procedures for handling security events which includes escalation paths, rapid resolution and post mortems.

Single Sign-On

Training

All employees complete a security training program to understand risks, procedures and employ best practices when handling customer data.

Single Sign-On

Policies

Our team is responsible for reviewing, updating, testing and maintaining our security, privacy and data protection policies. All employees are informed of our policies.

Security questions or issues?

Our security team is here to address any question that you may have.

Get started today

Our library of no-code integrations makes it quick and easy to get started—no technical skills required.

Integrations graphic