Security practices

Shapr3D is committed to maintaining the highest level of security for customer data. We employ industry-standard security measures, ensuring enterprise-level protection across all our solutions.

Key security features

  • SOC 2 Type II Compliance: We adhere to SOC 2 Type II standards, providing complete transparency over data management and security practices.
  • Single Sign-On (SSO): SSO configurations allow organizations to control access and maintain transparency across teams, ensuring only authorized personnel can access company data.
  • Service Level Agreement (SLA): Shapr3D guarantees a 99.5% service availability level, ensuring continuous access to our services.
  • Encryption: Data is encrypted both at rest and in transit, utilizing TLS and AES-256 encryption, ensuring that sensitive information remains protected.
  • Web Application Firewall (WAF) & Threat Detection: Public endpoints are secured via WAF to protect against common vulnerabilities, while third-party endpoint protection software detects malware and intrusions.
  • Incident Response: Shapr3D has a dedicated incident management plan in place to address any security breaches, ensuring timely investigation and remediation.

Endpoint and network security

  • Employee laptops are encrypted and managed through Mobile Device Management (MDM).
  • Firewalls and IDS/IPS systems are deployed for robust network security, and offices use strong encryption for wireless networks.

Frequently asked questions (FAQ)

Is two-factor authentication available for users and required for Shapr3D?

Two-factor authentication is not available for end-user authentication. It is required for Shapr3D employees who have access to the backend, including Shapr3D Sync.

How does Shapr3D protect my designs and data?

Shapr3D employs AES-256 encryption for data at rest and TLS 1.2+ for data in transit, ensuring your designs are secure during storage and transmission. Our platform is hosted on AWS with robust security protocols to safeguard your data against unauthorized access.

To learn more about your rights, what kind of personal data we collect, and other related information about these types of policies, visit our Privacy Policy, Data Processing Agreement, and Terms and Conditions pages.

Return to top
Was this article helpful?
0 out of 0 found this helpful

Topics