security.sweep.io
Open in
urlscan Pro
2a09:8280:1:667:634a:5608:6788:3e70
Public Scan
URL:
https://security.sweep.io/
Submission: On January 03 via automatic, source certstream-suspicious — Scanned from DE
Submission: On January 03 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
1 forms found in the DOM<form action="" novalidate="" role="search" class="sc-27a65a90-1 iWxQeb"><input aria-autocomplete="both" aria-labelledby="sp-search-autocomplete-label" autocomplete="off" autocorrect="off" autocapitalize="none" enterkeyhint="search"
spellcheck="false" placeholder="Find Item..." maxlength="512" role="searchbox" type="search" id="sp-search-autocomplete-input" class="sc-27a65a90-2 QKQau hide-clear sp-SearchBox shadow-sm form-control" value=""><button type="submit"
class="sc-27a65a90-3 lbFcir mx-1"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="magnifying-glass" class="svg-inline--fa fa-magnifying-glass " role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512">
<path fill="currentColor"
d="M416 208c0 45.9-14.9 88.3-40 122.7L502.6 457.4c12.5 12.5 12.5 32.8 0 45.3s-32.8 12.5-45.3 0L330.7 376c-34.4 25.2-76.8 40-122.7 40C93.1 416 0 322.9 0 208S93.1 0 208 0S416 93.1 416 208zM208 352a144 144 0 1 0 0-288 144 144 0 1 0 0 288z">
</path>
</svg></button></form>
Text Content
TRUST CENTER Share Subscribe Start your security review View & download sensitive information Ask for information Request Accessor Reclaim Access OVERVIEW Welcome to Sweep's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation. COMPLIANCE SOC 2 Start your security review View & download sensitive information Ask for information Request Accessor Reclaim Access DOCUMENTS Request Access to Private Documents SOC 2 Acceptable Use Policy Access Control Policy Anti-Malicious Software Policy Asset Management Policy Backup Policy Business Continuity Policy Data Classification Policy Encryption Policy General Incident Response Policy IMS Policy Information Security Policy Network Security Policy Password Policy Physical Security Risk Management Policy Software Development Lifecycle Third Party Personnel Policy Vulnerability Management Policy RISK PROFILE Data Access LevelInternal Impact LevelLow Recovery Time ObjectiveImmediate View more PRODUCT SECURITY Audit Logging Data Security Integrations View more DATA SECURITY Access Monitoring Backups Enabled Data Erasure View more APP SECURITY Code Analysis Credential Management Secure Development Training View more LEGAL Customer Audit Rights Data Processing Agreement Master Services Agreement View more DATA PRIVACY Cookies Data Breach Notifications Data Into System View more ACCESS CONTROL Data Access Logging Password Security INFRASTRUCTURE Amazon Web Services BC/DR Infrastructure Security View more ENDPOINT SECURITY Disk Encryption Endpoint Detection & Response Threat Detection NETWORK SECURITY Firewall IDS/IPS Security Information and Event Management CORPORATE SECURITY Asset Management Practices Email Protection Employee Training View more POLICIES Acceptable Use Policy Access Control Policy Anti-Malicious Software Policy View more Powered by