Highest Level of IT-Security

Your data security is our top priority. Spreadly is built with enterprise-grade security standards and full compliance with European data protection regulations.

ISO 27001:2022
ISO 27001:2022 Certified
GDPR
GDPR Compliant EU Data Protection
Made in Germany
Hosted in Germany Hetzner Datacenter
Trust

Certifications & Compliance

Spreadly meets the highest security standards and is compliant with all European data protection regulations.

ISO/IEC 27001:2022

Spreadly is ISO 27001:2022 certified, the internationally recognized standard for Information Security Management Systems (ISMS). This certification demonstrates our commitment to managing information security risks systematically.

GDPR Compliant

Our platform is fully compliant with the EU General Data Protection Regulation (GDPR). We implement privacy by design and provide all necessary tools for you to fulfill your data protection obligations.

Made & Hosted in Germany

Spreadly is developed in Germany and exclusively hosted on servers operated by Hetzner in Germany. Your data never leaves the EU, ensuring compliance with strict European data protection laws.

Security

Security Infrastructure

Your data is protected by multiple layers of security throughout the entire data lifecycle.

TLS 1.3 Encryption
All data in transit is protected using TLS 1.3, the latest encryption protocol. We enforce HTTPS on all connections.
Encrypted Storage
All data at rest is encrypted using AES-256 encryption. Database backups are also encrypted.
DDoS Protection
Our infrastructure includes enterprise-grade DDoS protection to ensure service availability.
Access Control
Strict role-based access control ensures only authorized personnel can access sensitive systems.
Regular Backups
Automated daily backups with geo-redundant storage ensure your data is always recoverable.
24/7 Monitoring
Continuous monitoring and alerting systems help us detect and respond to threats in real-time.
Features

Product Security

Spreadly provides powerful security features that give you full control over your organization's data.

Highest Level of IT-Security: Single Sign-On (SSO)
Authentication

Single Sign-On (SSO)

Connect Spreadly to your existing identity provider using SAML 2.0 or OAuth 2.0. Support for Microsoft Entra ID, Google Workspace, Okta, and other major providers.

Highest Level of IT-Security: Role-Based Permissions
Access Control

Role-Based Permissions

Define granular permissions at the role and team level. Control who can view, edit, or manage different aspects of your digital business cards.

Highest Level of IT-Security: Encryption
Data Protection

Encryption

All data is encrypted both in transit and at rest. We use TLS 1.3 for secure communication and AES-256 encryption for data storage to ensure your information remains protected.

Highest Level of IT-Security: Audit Logging
Compliance

Audit Logging

Comprehensive audit logs track all important actions within your organization. Export logs for compliance reporting and security analysis.

Purple top wave
Privacy

Data Privacy

Your privacy is at the core of everything we build.

No Data Selling

We never sell, share, or monetize your data. Your information is yours alone.

Data Portability

Export all your data at any time. We support standard formats for easy migration.

Right to Erasure

Delete your account and all associated data completely. We respect your right to be forgotten.

Data Processing Agreement

We provide a comprehensive DPA to ensure compliance with your internal policies.

Purple bottom wave
Processes

Operational Security

Security is embedded in every aspect of our operations and development process.

Secure Development
We follow secure coding practices and conduct regular code reviews. All changes go through our CI/CD pipeline with automated security checks.
Vulnerability Management
Regular security assessments and penetration testing help us identify and remediate vulnerabilities before they can be exploited.
Security Training
All team members receive regular security awareness training to stay up-to-date with the latest threats and best practices.
Incident Response
We have a documented incident response plan that ensures rapid detection, containment, and recovery from security incidents.
Vendor Management
We carefully evaluate all third-party vendors and ensure they meet our security standards. Our sub-processors are documented in our DPA.
Business Continuity
Our business continuity and disaster recovery plans ensure service availability even in unexpected circumstances.
Resources

Security Documentation

Access our security and compliance documentation.

FAQ

Frequently Asked Questions

Common questions about our security practices and compliance.

Where is my data stored?
Is Spreadly GDPR compliant?
What certifications does Spreadly have?
Do you offer a Data Processing Agreement (DPA)?
How do you handle security incidents?
Can I get a copy of your security documentation?
What happens to my data when I delete my account?
Do you support Single Sign-On (SSO)?
Lucas Haas
Lucas Haas
Account Executive, Spreadly

Any further questions? We are thrilled about your message.

1 - 10 employees