TheLoops Protects
Your Data

TheLoops is trusted with the most sensitive customer information of leading organizations. We specialize in industries with sophisticated security requirements— financial services, network services, IaaS and PaaS. TheLoops invests in security technologies, operations, and external audits to ensure our systems and processes are their best.

shield

Secure by Design

TheLoops’ architecture is secure by design. While operating as a cloud software-as-a-service (SaaS) platform, all customer data can be stored on your company’s infrastructure. In addition, all data is encrypted at Rest and protected by TLS in transit. 

lgo_SOC2

SOC 2 Certified

TheLoops is SOC2 Type 1 compliant. TheLoops’ service commitments and system requirements were achieved based on the trust services criteria relevant to security and confidentiality set forth in TSP 100, 2017 Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy.

Amazon Web Services

TheLoops uses Amazon Web Services (AWS) for hosting and staging and production environments. AWS is an environment that is ISO 27001, SOC 2 certified, and HIPAA-compliant. AWS data centers are monitored by 24x7 security, biometric scanning, and video surveillance.

Single Sign-On

TheLoops provides access controls at every layer. It authenticates users using SSO rather than requiring them to enter additional login credentials. You can authenticate through Okta, Google and Microsoft.

TheLoops Commitment to Security

Permissions & Access

We enable granular permission levels within TheLoops to be set for your teammates. Permission can be set to include app settings, integrations, user data and financial data.

Vulnerability Scanning

TheLoops utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.

Incident Response

TheLoops has policies and procedures for handling security events which includes escalation paths, rapid resolution and post mortems.

Training

All employees complete a security training program to understand risks, procedures and employ best practices when handling customer data.

Policies

Our team is responsible for reviewing, updating, testing and maintaining our security, privacy and data protection policies. All employees are informed of our policies.

Security Questions or Issues?

Our team is here to address any question that you may have.

Discover the Power of Real-time Support