Your Security, Our Priority

    Unleash the Power of
    SOC 2 Compliance

    Welcome to a world where data security isn't just a promise, but a commitment. Sharetru's SOC 2 Type II certified file sharing solution is your shield against costly data breaches, protecting your data and your bottom line.

    soc2-badge

    Taming the Cybersecurity Beast

    In 2011, the American Institute of CPAs unveiled the System and Organization Controls (SOC) framework, a response to the escalating cybersecurity threats plaguing diverse industries. The SOC framework empowers organizations to effectively communicate their cybersecurity strategies, dividing them into three distinct reporting levels.

    As a service provider, Sharetru is committed to security. The SOC 2 Type II certifications of our SaaS organization, as well as our underlying Cloud Services, provide proof of our commitment.

    AdobeStock_611106608



    Why SOC 2 Type II Matters to You

    SOC 2 compliance isn't just a badge we wear with pride—it's a guarantee of your data's safety. It's our way of mitigating cybersecurity threats and ensuring our service's high availability. Our independent SOC 2 audit reports are available to existing and prospective clients with a signed NDA.

    Start Free Trial

    The Difference Between SOC 2 Certification Types

    Our Standard and Advanced Compliance cloud-based platforms are both SOC 2 Type II certified at the cloud infrastructure and platform layers, making it a breeze to share large volumes of confidential data quickly and confidently on either platform.

    • SOC 2 Type I

      The First Step

      In a nutshell, SOC 2 Type I compliance verifies that our systems, controls, and procedures are designed to meet the stringent standards of the Service Organization Control (SOC) framework. It's an assurance that we take the security and confidentiality of your data as seriously as a heart attack.

      Specifically, SOC 2 Type I compliance focuses on the design effectiveness of our controls and procedures at a specific point in time. It's like a snapshot that showcases our commitment to safeguarding your information.

      Why should you care? Well, You can't get to SOC 2 Type II without SOC 2 Type I compliance. It demonstrates our dedication to data security. It's a signal to you and anyone else who entrusts us with their sensitive information that we stay up-to-date with industry best practices and have robust controls in place.

    • SOC 2 Type II

      The Proof of Our Diligence

      SOC 2 Type II compliance is like the gold standard of data protection. It's not enough to just have controls and procedures in place. SOC 2 Type II compliance ensures that these controls are not only designed effectively but also operating efficiently over a period of time.

      Think of it as our company going through rigorous testing and scrutiny, proving that we walk the talk when it comes to safeguarding your data. SOC 2 Type II compliance provides you with the peace of mind that we take data security seriously - and we have the measures in place to back it up.

      Why does this matter, you ask? Well, it's more than just a badge of honor. SOC 2 Type II compliance guides our vendor selection process, reduces the risk of third-party breaches, and showcases our unwavering commitment to data security to all our stakeholders - including your customers, partners, suppliers, and investors.

      In a world where cyber threats are lurking around every corner, SOC 2 Type II compliance is the armor that shields your data from harm. Don't settle for less. Choose a provider like us who goes above and beyond to ensure your data remains safe and secure.

    The First Step

    In a nutshell, SOC 2 Type I compliance verifies that our systems, controls, and procedures are designed to meet the stringent standards of the Service Organization Control (SOC) framework. It's an assurance that we take the security and confidentiality of your data as seriously as a heart attack.

    Specifically, SOC 2 Type I compliance focuses on the design effectiveness of our controls and procedures at a specific point in time. It's like a snapshot that showcases our commitment to safeguarding your information.

    Why should you care? Well, You can't get to SOC 2 Type II without SOC 2 Type I compliance. It demonstrates our dedication to data security. It's a signal to you and anyone else who entrusts us with their sensitive information that we stay up-to-date with industry best practices and have robust controls in place.

    The Proof of Our Diligence

    SOC 2 Type II compliance is like the gold standard of data protection. It's not enough to just have controls and procedures in place. SOC 2 Type II compliance ensures that these controls are not only designed effectively but also operating efficiently over a period of time.

    Think of it as our company going through rigorous testing and scrutiny, proving that we walk the talk when it comes to safeguarding your data. SOC 2 Type II compliance provides you with the peace of mind that we take data security seriously - and we have the measures in place to back it up.

    Why does this matter, you ask? Well, it's more than just a badge of honor. SOC 2 Type II compliance guides our vendor selection process, reduces the risk of third-party breaches, and showcases our unwavering commitment to data security to all our stakeholders - including your customers, partners, suppliers, and investors.

    In a world where cyber threats are lurking around every corner, SOC 2 Type II compliance is the armor that shields your data from harm. Don't settle for less. Choose a provider like us who goes above and beyond to ensure your data remains safe and secure.

    Building on a Foundation of Compliance

    We adhere to critical industry compliance standards to ensure your data is protected. SOC 2 standards are based on the Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy.

    ShareTru Icons-Protect Data and Systems
    Security Protect Data and Systems

    Our platform keeps data and systems protected from unauthorized access and disclosure of information, as well as damage to systems that could potentially jeopardize our ability to meet our cybersecurity objectives.

    ShareTru Icons-FTP-FTPS-SFTP-Compatibility
    Availability Ensure Accessibility

    We ensure that all of our systems and data are readily available for operation and use to meet our objectives by deploying lightning-quick disaster recovery methods and a robust incident response when necessary.

    ShareTru Icons-Support Smooth Operations
    Processing Integrity Support Smooth Operations

    Processing integrity refers to a system’s unimpaired performance. The standards we hold ourselves accountable for meeting help us keep our data processing activities timely, accurate, valid, authorized, and complete.

    ShareTru Icons-Maintain Effective Cloud Security
    Confidentiality Maintain Strict Secrecy

    We closely guard all confidential data to provide a secure file sharing experience. With a suite of advanced security features like role-based access control, firewalls, and more, our platform keeps information classified.

    ShareTru Icons-Safeguard Personal Information
    Privacy Safeguard Personal Information

    This criterion concerns personal information and its collection, use, retention, disclosure, and disposal. Our privacy policy ensures all personal data is secure and that our clients can access and change their data should the need arise. 

    Understanding the SOC
    Certification Framework

    SOC 1 Relevant to financial service providers, such as payment processors and accounting systems. As Sharetru doesn't provide these services, SOC 1 doesn't apply to us.
    SOC 2

    Applies to organizations that store and transmit customer-owned data, adhering to Trust Services Criteria (TSCs) regarding security, confidentiality, availability, processing integrity, and privacy. Sharetru falls into this category, hence our SOC 2 certification.

    SOC 3 Similar to SOC 2 compliance, but intended for public release. While Sharetru doesn't have a SOC 3 report, we can provide one at the datacenter layer with a signed NDA.
    sharetru-symbol-white

    Ready to Share With Confidence?

    You don’t have to take our word for it. We’ve been leading the charge in secure online file sharing since the very beginning, and we’d love to show you how we do it. Schedule your demo today.

    Book Your Demo