Security at Pursuit
Learn about Pursuit's security posture, practices, and procedures.
Data Privacy
We’re committed to safeguarding your information and ensuring compliance with regulations.
Compliance
We have designed our system and procedures with SOC 2 and NIST in mind, and are SOC 2 Type 1 certified.
User Consent and Control
We obtain explicit consent before collecting, processing, or sharing personal information, and provide tools for users to manage their data.
Data Minimization & Choice
We collect the minimum data required to deliver value to our clients. We also believe in offering our clients choice as to what level of integration is best for them.
Audits & Network Security
Robust protection through meticulous assessments and advanced defenses against cyber threats.
Regular assessments identify and address vulnerabilities, enhancing our cybersecurity defenses.
We use OAuth 2.0 to integrate with your sales stack; we do not store your credentials.
We snapshot our databases daily and offer a Recovery Time Objective (RTO) and a Recovery Point Objective (RPO) of 24 hours.
Our databases employ AES-256 encryption in transit and at rest. They feature multi-layer security with encrypted passwords, MFA, and intrusion detection.
We utilize Virtual Private Clouds (VPCs) to isolate and protect our resources, ensuring secure and efficient network segmentation and control over data traffic.
We employ stringent access controls to regulate user access to network resources, minimizing the risk of unauthorized breaches.
Annual independent audits to maintain certification, with continuous monitoring and improvement of controls. Type 2 certification is currently in progress.
We conduct regular third-party penetration testing of our systems and infrastructure, including both internal and external assessments.
Fast growing government contractors use Pursuit to find and win more contracts.