Overview
Overview

This page provides an overview of Fathom's security program. For any security related questions that haven't been addressed on this page, please email us at security@fathom.video.

Compliance
Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
SOC 2 Logo
SOC 2

Documents
Documents

18 Documents
Pentest Report
SOC 2 Report
SOC 2
Acceptable Use Policy
Access Control Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
Data Classification Policy
Data Security Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Password Policy
Physical Security
Risk Management Policy
Software Development Lifecycle

Risk Profile
Risk Profile

Data Access LevelInternal
Impact LevelModerate
Critical DependenceNo
View 2 More Items

Product Security
Product Security

Audit Logging
Data Security
Integrations
View 1 More Item

Reports
Reports

Network Diagram
Pentest Report
SOC 2 Report

Data Security
Data Security

Access Monitoring
Backups Enabled
Data Erasure
View 3 More Items

App Security
App Security

Bug Bounty
Code Analysis
Software Development Lifecycle
View 2 More Items

Access Control
Access Control

Data Access
Logging
Password Security

Infrastructure
Infrastructure

Anti-DDoS
Amazon Web Services
Google Cloud Platform
View 1 More Item

Security Grades
Security Grades

Qualys SSL Labs
  • Fathom App
    A+

Endpoint Security
Endpoint Security

Mobile Device Management

Network Security
Network Security

Firewall
Virtual Private Cloud

Corporate Security
Corporate Security

Employee Training
Incident Response
Single Sign-On

Policies
Policies

Acceptable Use Policy
Access Control Policy
Asset Management Policy
View 11 More Items