security.sweep.io Open in urlscan Pro
2a09:8280:1:667:634a:5608:6788:3e70  Public Scan

URL: https://security.sweep.io/
Submission: On January 03 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

<form action="" novalidate="" role="search" class="sc-27a65a90-1 iWxQeb"><input aria-autocomplete="both" aria-labelledby="sp-search-autocomplete-label" autocomplete="off" autocorrect="off" autocapitalize="none" enterkeyhint="search"
    spellcheck="false" placeholder="Find Item..." maxlength="512" role="searchbox" type="search" id="sp-search-autocomplete-input" class="sc-27a65a90-2 QKQau hide-clear sp-SearchBox shadow-sm form-control" value=""><button type="submit"
    class="sc-27a65a90-3 lbFcir mx-1"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="magnifying-glass" class="svg-inline--fa fa-magnifying-glass " role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512">
      <path fill="currentColor"
        d="M416 208c0 45.9-14.9 88.3-40 122.7L502.6 457.4c12.5 12.5 12.5 32.8 0 45.3s-32.8 12.5-45.3 0L330.7 376c-34.4 25.2-76.8 40-122.7 40C93.1 416 0 322.9 0 208S93.1 0 208 0S416 93.1 416 208zM208 352a144 144 0 1 0 0-288 144 144 0 1 0 0 288z">
      </path>
    </svg></button></form>

Text Content

TRUST CENTER

Share
Subscribe
Start your security review
View & download sensitive information
Ask for information
Request Accessor Reclaim Access

OVERVIEW

Welcome to Sweep's Trust Center. Our commitment to data privacy and security is
embedded in every part of our business. Use this Trust Center to learn about our
security posture and request access to our security documentation.

COMPLIANCE


SOC 2
Start your security review
View & download sensitive information
Ask for information
Request Accessor Reclaim Access
DOCUMENTS


Request Access to Private Documents
SOC 2

Acceptable Use Policy

Access Control Policy

Anti-Malicious Software Policy

Asset Management Policy

Backup Policy

Business Continuity Policy

Data Classification Policy

Encryption Policy

General Incident Response Policy

IMS Policy

Information Security Policy

Network Security Policy

Password Policy

Physical Security

Risk Management Policy

Software Development Lifecycle

Third Party Personnel Policy

Vulnerability Management Policy




RISK PROFILE

Data Access LevelInternal
Impact LevelLow
Recovery Time ObjectiveImmediate
View more
PRODUCT SECURITY

Audit Logging
Data Security
Integrations
View more
DATA SECURITY

Access Monitoring
Backups Enabled
Data Erasure
View more
APP SECURITY

Code Analysis
Credential Management
Secure Development Training
View more
LEGAL

Customer Audit Rights
Data Processing Agreement
Master Services Agreement
View more
DATA PRIVACY

Cookies
Data Breach Notifications
Data Into System
View more
ACCESS CONTROL

Data Access
Logging
Password Security
INFRASTRUCTURE

Amazon Web Services
BC/DR
Infrastructure Security
View more
ENDPOINT SECURITY

Disk Encryption
Endpoint Detection & Response
Threat Detection
NETWORK SECURITY

Firewall
IDS/IPS
Security Information and Event Management
CORPORATE SECURITY

Asset Management Practices
Email Protection
Employee Training
View more
POLICIES

Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
View more
Powered by