Trust Center

Start your security review
View & download sensitive information
ControlK

Welcome to Syndio’s Trust Center!

At Syndio, protecting customer data is foundational to everything we do. Our security, privacy, and compliance programs are designed to align with leading industry standards and frameworks, ensuring the confidentiality, integrity, and availability of our services and the data entrusted to us.

This Trust Center provides transparency into our security practices, governance approach, and compliance posture. You’ll find details on our policies, controls, and independent certifications that demonstrate our ongoing commitment to safeguarding your information as we continue to innovate.

Microsoft-company-logoMicrosoft
Nokia-company-logoNokia
American Airlines-company-logoAmerican Airlines
Salesforce-company-logoSalesforce
General Mills-company-logoGeneral Mills
Nordstrom-company-logoNordstrom
Siemens-company-logoSiemens
ConocoPhillips-company-logoConocoPhillips
Outokumpu-company-logoOutokumpu
BMC Software-company-logoBMC Software
Elevance Health-company-logoElevance Health
Ford Motor Company-company-logoFord Motor Company
United Rentals-company-logoUnited Rentals
Bayer-company-logoBayer
Assurant-company-logoAssurant
Campari-company-logoCampari

Documents

Featured Documents

COMPLIANCESOC 2 Type 2
Acceptable Use Policy
Asset Management Policy
Backup Policy
View more
Trust Center Updates

New SOC 2 Type II & SOC 3 Reports Available!

Copy link
Compliance

We’re pleased to share that Syndio has successfully completed our annual SOC 2 Type II and SOC 3 audits, covering the audit period from November 2024 through November 2025.

These independent assessments reinforce our commitment to protecting customer data and operating our platform with strong security and privacy practices.

Our reports are available for download via our Trust Center.

Knowledge Base (FAQ)
  • What security controls/mechanisms have been implemented to prevent and detect unauthorized access attempts or malicious activity (e.g., IDS, IPS, DLP, anti-virus, anti-malware, full disk encryption, configuration management, network/application vulnerability scans, etc.)?
  • Does your organization have a policy, guideline or standard for classifying, labeling, and handling (print, store, use, transport, and destruct/dispose) information/data in electronic and/or hardcopy form?
  • Are your backups encrypted?
  • Does your organization have a BCP plan in place? How often is it reviewed?
  • Is there a risk assessment program in place? If yes, what is the frequency and are the results tracked and communicated to senior leadership periodically?
View more