Fathom Logo

Overview
Overview

This page provides an overview of Fathom's security program. For any security related questions that haven't been addressed on this page, please email us at security@fathom.video.

Risk Profile
Risk Profile

Data Access LevelInternal
Impact LevelModerate
Critical DependenceNo
View 2 More Items

Product Security
Product Security

Audit Logging
Data Security
Integrations
View 1 More Item

Certifications & Compliance
Certifications & Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
SOC 2 Logo
SOC 2

Reports
Reports

Network Diagram
Pentest Report
SOC 2 Report

Data Security
Data Security

Access Monitoring
Backups Enabled
Data Erasure
View 3 More Items

App Security
App Security

Bug Bounty
Code Analysis
Software Development Lifecycle
View 2 More Items

Access Control
Access Control

Data Access
Logging
Password Security

Infrastructure
Infrastructure

Anti-DDoS
Amazon Web Services
Google Cloud Platform
View 1 More Item

Security Grades
Security Grades

Qualys SSL Labs
  • Fathom App
    A+

Endpoint Security
Endpoint Security

Mobile Device Management

Network Security
Network Security

Firewall
Virtual Private Cloud

Corporate Security
Corporate Security

Employee Training
Incident Response
Single Sign-On

Policies
Policies

Acceptable Use Policy
Access Control Policy
Asset Management Policy
View 11 More Items