There's currently no search results available...
Security is Embedded in Our DNA
Managing data responsibly is our top priority. Spryker's cloud platform is a single-tenant solution hosted in certified data centers across Europe, the US, and APAC. We follow industry best practices and standards to ensure data security and compliance.
Certifications & Compliance Frameworks
We align with globally recognized standards and compliance frameworks to ensure the highest levels of security and governance. Our security controls undergo regular evaluation through independent third-party audits to verify their effectiveness and ensure continuous compliance.
ISO/IEC 27001:2022
Certified information security management system covering our infrastructure, processes, and people.
SOC 2 Type II
Independent audit validating our security, availability, and confidentiality and privacy controls over time.
Industry Certifications & Compliance
ISO/IEC 27001:2022
Download our ISO/IEC 27001:2022 certification by clicking here
SOC 2 TYPE II
Please contact us to request the current SOC 2 Type II report.
Penetration Test Report
Please contact us to request our current penetration test report.
Privacy & GDPR Alignment
Read our Privacy Policy to learn how we collect, use, and safeguard personal data in compliance with GDPR and other applicable regulations.
Our Commitment to Data Protection
GDPR compliant
Spryker’s processing of personal data on your behalf will be protected under a Data Processing Agreement and the state-of-the-art set of Technical Organizational Measures.
Network security
We implement robust network security measures, including firewalls, intrusion detection, and traffic monitoring, to protect against unauthorized access and threats.
Secure cloud hosting
We operate on secure cloud infrastructure with continuous monitoring and proactive vulnerability management to maintain a strong security posture.
Secure access controls
We protect accounts with secure access controls and Multi-Factor Authentication (MFA) to prevent unauthorized access.
Encryption in transit and at rest
We use strong, industry-standard encryption to protect data both while stored and during transfer, ensuring confidentiality and trust at every stage.
Vulnerability management
We employ proactive vulnerability management and regular patching to mitigate risks and protect against emerging threats.
Geo-redundant encrypted backups
We maintain geo-redundant encrypted backups to ensure data availability, resilience, and rapid recovery in the event of a disaster.
Continuous security training
We provide ongoing security awareness training to all employees, ensuring they stay vigilant and prepared against evolving threats.
We are dedicated to maintaining your trust by continuously improving our security practices and ensuring the highest standards of protection for your data.