Trust Center

Get access to this Trust Center
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Reclaim access anytime
Had access before? Reclaim access

Overview

This page provides an overview of Fathom's security program. For any security related questions that haven't been addressed on this page, please email us at security@fathom.video.

Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
SOC 2 Logo
SOC 2
Get access to this Trust Center
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Reclaim access anytime
Had access before? Reclaim access

Documents

Pentest Report
SOC 2 Report
SOC 2
Cyber Insurance
Acceptable Use Policy
Access Control Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
Data Classification Policy
Data Security Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Password Policy
Physical Security
Risk Management Policy
Software Development Lifecycle
Vulnerability Management Policy
Penetration Testing

Risk Profile

Data Access LevelInternal
Impact LevelModerate
Critical DependenceNo
See more

Product Security

Audit Logging
Data Security
Integrations
See more

Reports

Network Diagram
Pentest Report
SOC 2 Report

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

App Security

Responsible Disclosure
Code Analysis
Credential Management
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Anti-DDoS
Google Cloud Platform
See more

Endpoint Security

Disk Encryption
Mobile Device Management
Threat Detection

Network Security

Firewall
Virtual Private Cloud

Corporate Security

Employee Training
Incident Response
Internal SSO
See more

Policies

Acceptable Use Policy
Access Control Policy
Asset Management Policy
See more

Security Grades

Qualys SSL Labs
Fathom App
A+
Powered BySafeBase Logo