- Trust Center
SkySuite’s security program is built on trust with our customers. SkySuite is actively working towards completing a SOC 2 Type II audit and continually enhancing its security measures to meet evolving customer needs.
Information Handling & Retention
- Customer Personal Data
- Zero Data Retention (ZDR) by OpenAI & Anthropic
- Credit Card Handling
Resources
Tech Stack
OpenAl - Large Language Model (LLM) Provider
Large Language Models (LLM) and other API services used by the SkySuite application
Anthropic - Large Language Model (LLM) Provider
Large Language Models (LLM) and other API services used by the SkySuite application
Microsoft - Large Language Model (LLM) Provider
Large Language Models (LLM) and other API services used by the SkySuite application
Google Cloud Platform - Large Language Model (LLM) Provider
Large Language Models (LLM) and other API services used by the SkySuite application
Stripe - Payment Processing
Used for processing payments related to SkySuite subscriptions
Zoom - Collaboration (Customer Optional)
Provide video conferencing and recording
Loom Customer - Success (Customer Optional)
Provides screen recording of product demos and functionality
Calendly - Customer Success (Customer Optional)
Provides calender scheduling with customers
Micrsoft Azure
Primary hosting provider for the SkySuite application, file data and other services.
Protocols
Secure Access & Data Protections:
- Dedicated Database Authentication
Only authorized users can access production databases through unique, secure methods like SSH keys.
- Individualized User Access
Systems and applications require distinct usernames, passwords, or approved SSH keys for authentication.
- Application Access Controls
Production applications are restricted to approved personnel
- Database Access Restrictions
Privileged access to databases is limited to users with a valid business reason.
- Network Access Limitations
Production network access is granted exclusively to those with a verified business need.
- Personalized Network Logins
Secure access to the network requires unique usernames, passwords, or SSH key credentials.
- Encrypted Remote Connections
Remote access is only allowed through encrypted channels.
- Firewall Security
Firewalls are set up to prevent unauthorized access to the network.
Organizational Safeguards:
- Anti-Malware Defenses
Anti-malware technology is routinely updated and monitored across all relevant systems.
- Employee Performance Reviews
Data Protection & Product Security:
- Stored Data Encryption
- Annual Security Reviews
Operational Procedures & Support:
- Defined Organizational Structure
- User Support Channels
- Communication of System Updates
- Commitments to Customer Security
- Customer Resources & Support
Start Today
Ready to get started?
Join our growing network today!
SkySuite, the leading productivity solution for Excel, PowerPoint, & Word. Join our growing network today!