Security
Triple Session is committed to the security and privacy of our customer's data.
01.
Access should be limited to only those with a legitimate business need and granted based on the principle of least privilege.
02.
Security controls should be implemented and layered according to the principle of defense-in-depth.
03.
Security controls should be applied consistently across all areas of the enterprise.
04.
The implementation of controls should be iterative, continuously maturing across the dimensions of improved effectiveness, increased auditability, and decreased friction.
Security and Compliance at
Triple Session
We maintain rigorous security standards across our entire infrastructure.
Our security program is built on industry best practices and frameworks including SOC 2 Type II, ensuring your data is protected at every level.
We employ end-to-end encryption, regular security audits, and strict access controls. Our engineering team follows secure development practices, and we continuously monitor our systems for potential vulnerabilities.
When it comes to AI analysis of sales calls, we maintain strict data isolation and implement additional security measures to ensure sensitive conversations remain private and protected.
Our SOC 2 Type II and SOC3 reports are available upon request through our Trust Center, demonstrating our ongoing commitment to security, availability, and confidentiality.
Data security you can count on
Triple Session is proud to be SOC2-certified, reflecting our dedication to delivering a secure and reliable platform for sales teams.
Data protection
Data at rest
All datastores with customer data are encrypted at rest. Sensitive collections and tables also use row-level encryption.
Data in transit
Triple Session uses TLS 1.3 or higher everywhere data is transmitted over potentially insecure networks.
Data backup
Triple Session backs-up all data using a point-in-time approach. Backups are persisted for 7 days.
Security Controls
With industry best practices, third-party auditors, and a collection of operational controls, Triple Session is committed to the safety and confidentiality of your data.
Infrastructure Security
- Unique production database authentic...
- Encryption key access restricted
- Access control procedures established
Organizational Security
- MDM system utilized
- Production inventory maintained
- Security awareness training implemented
Product Security
- Data encryption utilized
- Control self-assessments conducted
- Data transmission encrypted
Internal Security Procedures
- Access requests required
- Production deployment access restricted
- Development lifecycle established
Data and Privacy
- Data retention procedures established
- Customer data deleted upon leaving
- Data classification policy established