Security

Triple Session is committed to the security and privacy of our customer's data.

Our policies are based on the following foundational principles:

01.

Access should be limited to only those with a legitimate business need and granted based on the principle of least privilege.

02.

Security controls should be implemented and layered according to the principle of defense-in-depth.

03.

Security controls should be applied consistently across all areas of the enterprise.

04.

The implementation of controls should be iterative, continuously maturing across the dimensions of improved effectiveness, increased auditability, and decreased friction.

Security and Compliance at
Triple Session

We maintain rigorous security standards across our entire infrastructure.

Our security program is built on industry best practices and frameworks including SOC 2 Type II, ensuring your data is protected at every level.

We employ end-to-end encryption, regular security audits, and strict access controls. Our engineering team follows secure development practices, and we continuously monitor our systems for potential vulnerabilities.

When it comes to AI analysis of sales calls, we maintain strict data isolation and implement additional security measures to ensure sensitive conversations remain private and protected.

Our SOC 2 Type II and SOC3 reports are available upon request through our Trust Center, demonstrating our ongoing commitment to security, availability, and confidentiality.

SOC2 Certification

Data security you can count on

Triple Session is proud to be SOC2-certified, reflecting our dedication to delivering a secure and reliable platform for sales teams.

SOC2 Certification Badge

Data protection

Data at rest

All datastores with customer data are encrypted at rest. Sensitive collections and tables also use row-level encryption.

Data in transit

Triple Session uses TLS 1.3 or higher everywhere data is transmitted over potentially insecure networks.

Data backup

Triple Session backs-up all data using a point-in-time approach. Backups are persisted for 7 days.

Security Controls

With industry best practices, third-party auditors, and a collection of operational controls, Triple Session is committed to the safety and confidentiality of your data.

Infrastructure Security

  • Unique production database authentic...
  • Encryption key access restricted
  • Access control procedures established

Organizational Security

  • MDM system utilized
  • Production inventory maintained
  • Security awareness training implemented

Product Security

  • Data encryption utilized
  • Control self-assessments conducted
  • Data transmission encrypted

Internal Security Procedures

  • Access requests required
  • Production deployment access restricted
  • Development lifecycle established

Data and Privacy

  • Data retention procedures established
  • Customer data deleted upon leaving
  • Data classification policy established