Login

Privacy and security is in our DNA.

From our protocols and policies to the technology we use, security is front and center in everything we do.

Security - it's everyone's job

At Similarweb, security is everyone’s responsibility. We combine enterprise-grade security features with comprehensive audits of our policies, applications, systems, and networks.

All our employees (and contractors) have an obligation to maintain the confidentiality, integrity, accessibility, and security of the data managed by Similarweb.

Security
Policies

Policies that go above and beyond

Our security controls are at the heart of our commitment to compliance where we strive to go above and beyond data privacy laws, regulations, and industry standards.

We:
  • Develop, recommend, and implement enterprise policies, technical standards, guidelines, procedures, and other elements necessary to support information security
  • Perform ongoing risk assessments on our corporate network, cloud environments and recommend risk mitigations.
  • Use a dedicated third parties risk assessment platform to perform an ongoing third-party security review of our key suppliers
  • Maintain and enhance disaster recovery and business continuity plans, and test them regularly
  • Develop and manage our security incident response process

SOC2 validated

We’re dedicated to customer data security and hold an independently validated SOC2 certification. This demonstrates our unwavering commitment to secure services and processes, and to data confidentiality.

SOC2 validated

Industry-leading technology

Our multi-layered controls protect our infrastructure and help us constantly monitor and improve our applications, systems, and processes to meet ever-changing security challenges.

We use a wide range of tools to monitor our environment across data centers on both the infrastructure- and app-level.

Our dedicated security team implements and manages our information protection technologies. Their responsibilities include:

  • Corporate network security
  • Cloud environment security
  • SaaS security
  • Application security
  • Identity and access controls
  • Change management
  • Vulnerability management
  • Incident response
  • Third-party security
  • Penetration tests
  • Bug Bounty program
Industry-leading technology

Privacy by Design

To keep your information safe, we follow all applicable standards and regulations. We devote substantial time, effort, and resources toward compliance with all applicable privacy laws and regulations – like GDPR and CCPA – and invest heavily in developing data collection methodologies and practices that maximize compliance and protect customers’ privacy interests:

1. We employ a multi-step verification process to avoid the collection of personal data or personally identifiable information (PII)

2. Behavioral data is collected anonymously and aggregated at the site- and app-level – rather than the user-level

3. Data is never used for targeted advertising or user profiling, and we don’t use “cookies” to collect behavioral data

Supporting documents

Information Security Policy


Security Controls

Copies of our SOC2 Report are available by request and with a signed NDA in place.

If you’d like a copy, please contact our Security Team.

SOC2 validated