Overview
This page provides an overview of Fathom's security program. For any security related questions that haven't been addressed on this page, please email us at security@fathom.video.
Compliance

Documents
Pentest Report
SOC 2 Report
SOC 2
Cyber Insurance
Acceptable Use Policy
Access Control Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
Data Classification Policy
Data Security Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Password Policy
Physical Security
Risk Management Policy
Software Development Lifecycle
Vulnerability Management Policy
Penetration Testing
Risk Profile
Data Access LevelInternal
Impact LevelModerate
Critical DependenceNo
See more
Product Security
Audit Logging
Data Security
Integrations
See more
Reports
Network Diagram
Pentest Report
SOC 2 Report
Data Security
Access Monitoring
Backups Enabled
Data Erasure
See more
App Security
Responsible Disclosure
Code Analysis
Credential Management
See more
Access Control
Data Access
Logging
Password Security
Infrastructure
Amazon Web Services
Anti-DDoS
Google Cloud Platform
See more
Endpoint Security
Disk Encryption
Mobile Device Management
Threat Detection
Network Security
Firewall
Virtual Private Cloud
Corporate Security
Employee Training
Incident Response
Internal SSO
See more
Policies
Acceptable Use Policy
Access Control Policy
Asset Management Policy
See more
Security Grades
Qualys SSL Labs
Fathom App
A+