trust.1-team.safebase.io Open in urlscan Pro
2606:4700::6812:1f06  Public Scan

URL: https://trust.1-team.safebase.io/
Submission: On November 06 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

<form action="" novalidate="" role="search" class="sc-183eb46a-1 jZQMOW"><input aria-autocomplete="both" aria-labelledby="sp-search-autocomplete-label" autocomplete="off" autocorrect="off" autocapitalize="none" enterkeyhint="search"
    spellcheck="false" placeholder="Find Item..." maxlength="512" role="searchbox" theme="[object Object]" type="search" id="sp-search-autocomplete-input"
    class="sc-183eb46a-2 iDcTCU sp-SearchBox shadow-sm sp-SearchBox shadow-sm hide-clear form-control" value=""><button type="submit" class="sc-183eb46a-3 ikWSfl mx-1"><svg aria-hidden="true" focusable="false" data-prefix="fas"
      data-icon="magnifying-glass" class="svg-inline--fa fa-magnifying-glass " role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512">
      <path fill="currentColor"
        d="M416 208c0 45.9-14.9 88.3-40 122.7L502.6 457.4c12.5 12.5 12.5 32.8 0 45.3s-32.8 12.5-45.3 0L330.7 376c-34.4 25.2-76.8 40-122.7 40C93.1 416 0 322.9 0 208S93.1 0 208 0S416 93.1 416 208zM208 352a144 144 0 1 0 0-288 144 144 0 1 0 0 288z">
      </path>
    </svg></button></form>

Text Content

Oh Mama mia, mama mia


TRUST CENTER

Subscribe
Get access to this Trust Center
 * Review sensitive security details
 * Unlock documents
 * Submit security questionnaires
 * Ask for more information

Request access
Had access before? Reclaim access

OVERVIEW

We have really very good security 2

Your security is our #1 priority and we take it seriously. At our company, we
handle critical financial data of your business. These include information about
your processes, revenue, payment gateway information and merchant information.
During these processes, we know the security of our system should be air-tight
to provide you with a hassle-free experience. Our teams take preventive
measures, adheres and keep up with the latest security and compliance practices
across the globe.

COMPLIANCE


EU-US DPF
Get access to this Trust Center
 * Review sensitive security details
 * Unlock documents
 * Submit security questionnaires
 * Ask for more information

Request access
Had access before? Reclaim access
TEST ORGANIZATION IS REVIEWED AND TRUSTED BY

SafeBase
DOCUMENTS


Request Access to Private Documents
Pentest Report

SOC 2 Report

EU-US DPF

CAIQ

Master Services Agreement

Acceptable Use Policy

Access Control Policy

Anti-Malicious Software Policy

Asset Management Policy

Example Item








RISK PROFILE

Data Access LevelInternal
REPORTS

Pentest Report
Security Whitepaper
SOC 2 Report
SELF-ASSESSMENTS

CAIQ
DATA SECURITY

Access Monitoring
Backups Enabled
APP SECURITY

We take application security seriously and are putting together a program to
monitor internal apps.

LEGAL

Subprocessors
Master Services Agreement
Privacy Policy
DATA PRIVACY

Privacy of customer data is top of mind. We follow industry best practices and
follow all applicable privacy regulations.

ACCESS CONTROL

Access is tightly monitored and controlled at our company. We are happy to
provide more details about our access control practices upon request.

INFRASTRUCTURE

We take great care to work with best-in-class infrastructure providers that
provide secure computing and storage. We are happy to provide more details about
our infrastructure upon request.

ENDPOINT SECURITY

We follow industry best practices for endpoint security. We are happy to provide
more details about our endpoint security practices upon request.

NETWORK SECURITY

We protect our corporate network against external & internal threats.

CORPORATE SECURITY

We implement internal measures and practices to maintain a high standard of
security.

POLICIES

Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
View more
SECURITY GRADES

Qualys SSL Labs
API Endpoint
A

KNOWLEDGE BASE

 * Do you have a SOC2 report?
   
 * Is data classified according to type and sensitivity levels?
   
 * Is a data inventory created and maintained for sensitive and personal
   information (at a minimum)?
   
 * Are industry-accepted methods applied for secure data disposal from storage
   media so information is not recoverable by any forensic means?
   
 * Are data security and privacy policies and procedures reviewed and updated at
   least annually?
   

View more
TRUST CENTER UPDATES

Subscribe


OH MAMA MIA, MAMA MIA

GeneralCopy link

Mama mia, let me go

Published at 11/03/2023, 3:48 PM
Powered by