
Cube
- Websitehttps://www.cubesoftware.com
- Trust Centerhttps://security.cubesoftware.com
- Compliance
- SOC 2
- SOC 2 Type I
null
1 more topic
- Product Security
- Audit Logs
- Multi-Factor Authentication
Text or app-based authentication can be used.
5 more topics
- Data Security
- Data Encrypted At-Rest
Cube's database instances use the industry standard AES-256 encryption algorithm to encrypt your data.
- Data Encrypted In-Transit
null
1 more topic
- Privacy
- Data Retention Policy
- Incident Management & Response
- Incident Response Plan (IRP)
- Availability & Reliability
- Infrastructure Redundancy
- Quality Assurance Testing
2 more topics
- Organizational Security
- Confidentiality Agreements
- Employee Background Checks
6 more topics
- Business Continuity
- Business Continuity Plan
- Disaster Recovery Plan
2 more topics
- Infrastructure
- SOC 2 - Data Center
Cube uses Amazon Web Services (AWS) for our data centers. See https://aws.amazon.com/compliance/soc-faqs/.
- SOC 2 Type II - Data Center
Cube uses Amazon Web Services (AWS) for our data centers. See https://aws.amazon.com/compliance/soc-faqs/.
1 more topic
- Threat Management
- Penetration Testing
- Vulnerability Scanning
- Subprocessors
Sign up to view Cube's Subprocessors
Sign up to see the rest of Cube's posture and unlock unlimited access.
Unlimited access to the directory allows you to review and compare thousands of security postures sourced from around the web.