Legal Center

Read our transparent legal policies and agreements in our Legal Center to ensure full compliance with and understanding of Syncfusion's terms and conditions.

banner-image

Security and Reliability

soc-2-compliance

SOC 2® Compliance

We received our SOC 2® Type 2 certification, proving that our security policies and controls consistently meet standards when it comes to keeping data within necessary boundaries.

privacy-gpr

Privacy & GDPR

Syncfusion takes data privacy very seriously, and we strive to be GDPR compliant. We stand out for possessing a comprehensive security system to secure data.

datacenter-security

Datacenter Security

We use Microsoft Azure to host our infrastructure. Microsoft is deeply committed to security and is continuously expanding its compliance programs.

payment-security

Payment Security

Syncfusion uses a PCI-compliant payment system for encrypting and processing credit card payments. We have partnered with PayPal and Stripe to securely handle sensitive payment processing data. Syncfusion does not have access to customer credit card data.

penetration-testing

Penetration Testing

Syncfusion has well-equipped security specialists and development teams to perform penetration testing. A yearly penetration test is performed to secure our products.

secure-by-design

Secure by Design

Every feature update is monitored and governed by a change management policy. The code is screened with active analyzer tools and manually reviewed.

backup

Backup

Data is backed up securely in case you need to regain access to your data and service. Our monitoring system alerts us to any arising problems, and we have dedicated staff to handle any situation.

monitoring-and-alerting

Monitoring and Alerting

The application and its components are monitored 24/7. Our engineers are immediately notified in the event of a service interruption.

vulnerability-scans

Vulnerability Scans

Syncfusion uses security tools to scan for vulnerabilities. In addition, third-party libraries and tools are monitored and updated frequently, and immediately patched when issues are reported. HostedScan is used to check for vulnerabilities in our websites. Passive testing is conducted to check our web applications for cross-domain misconfigurations, insecure cookies, and vulnerable JS dependencies.

uptime

Uptime

Syncfusion has a 99.9% uptime. Clients are notified well in advance if our systems require maintenance or will have a brief outage.

To learn more about our security practices, refer to our Security Management Report.

Security and Reliability

soc-2-compliance

SOC 2® Compliance

We received our SOC 2® Type 2 certification, proving that our security policies and controls consistently meet standards when it comes to keeping data within necessary boundaries.

privacy-gpr

Privacy & GDPR

Syncfusion takes data privacy very seriously, and we strive to be GDPR compliant. We stand out for possessing a comprehensive security system to secure data.

datacenter-security

Datacenter Security

We use Microsoft Azure to host our infrastructure. Microsoft is deeply committed to security and is continuously expanding its compliance programs.

payment-security

Payment Security

Syncfusion uses a PCI-compliant payment system for encrypting and processing credit card payments. We have partnered with PayPal and Stripe to securely handle sensitive payment processing data. Syncfusion does not have access to customer credit card data.

penetration-testing

Penetration Testing

Syncfusion has well-equipped security specialists and development teams to perform penetration testing. A yearly penetration test is performed to secure our products.

secure-by-design

Secure by Design

Every feature update is monitored and governed by a change management policy. The code is screened with active analyzer tools and manually reviewed.

backup

Backup

Data is backed up securely in case you need to regain access to your data and service. Our monitoring system alerts us to any arising problems, and we have dedicated staff to handle any situation.

monitoring-and-alerting

Monitoring and Alerting

The application and its components are monitored 24/7. Our engineers are immediately notified in the event of a service interruption.

vulnerability-scans

Vulnerability Scans

Syncfusion uses security tools to scan for vulnerabilities. In addition, third-party libraries and tools are monitored and updated frequently, and immediately patched when issues are reported. HostedScan is used to check for vulnerabilities in our websites. Passive testing is conducted to check our web applications for cross-domain misconfigurations, insecure cookies, and vulnerable JS dependencies.

uptime

Uptime

Syncfusion has a 99.9% uptime. Clients are notified well in advance if our systems require maintenance or will have a brief outage.

To learn more about our security practices, refer to our Security Management Report.

Security and Reliability

soc-2-compliance

SOC 2® Compliance

We received our SOC 2® Type 2 certification, proving that our security policies and controls consistently meet standards when it comes to keeping data within necessary boundaries.

privacy-gpr

Privacy & GDPR

Syncfusion takes data privacy very seriously, and we strive to be GDPR compliant. We stand out for possessing a comprehensive security system to secure data.

datacenter-security

Datacenter Security

We use Microsoft Azure to host our infrastructure. Microsoft is deeply committed to security and is continuously expanding its compliance programs.

payment-security

Payment Security

Syncfusion uses a PCI-compliant payment system for encrypting and processing credit card payments. We have partnered with PayPal and Stripe to securely handle sensitive payment processing data. Syncfusion does not have access to customer credit card data.

penetration-testing

Penetration Testing

Syncfusion has well-equipped security specialists and development teams to perform penetration testing. A yearly penetration test is performed to secure our products.

secure-by-design

Secure by Design

Every feature update is monitored and governed by a change management policy. The code is screened with active analyzer tools and manually reviewed.

backup

Backup

Data is backed up securely in case you need to regain access to your data and service. Our monitoring system alerts us to any arising problems, and we have dedicated staff to handle any situation.

monitoring-and-alerting

Monitoring and Alerting

The application and its components are monitored 24/7. Our engineers are immediately notified in the event of a service interruption.

vulnerability-scans

Vulnerability Scans

Syncfusion uses security tools to scan for vulnerabilities. In addition, third-party libraries and tools are monitored and updated frequently, and immediately patched when issues are reported. HostedScan is used to check for vulnerabilities in our websites. Passive testing is conducted to check our web applications for cross-domain misconfigurations, insecure cookies, and vulnerable JS dependencies.

uptime

Uptime

Syncfusion has a 99.9% uptime. Clients are notified well in advance if our systems require maintenance or will have a brief outage.

To learn more about our security practices, refer to our Security Management Report.

Loading
Loading
Loading