
Demandbase is an account-based marketing platform with strong security posture holding ISO 27001 and SOC 2 Type II certifications. With risk management using Open Threat Taxonomy, annual penetration testing, and robust business continuity, Demandbase demonstrates enterprise-grade security controls across AWS and GCP infrastructure serving B2B teams globally.
Third-party audited certification validating comprehensive information security management system implementation with annual surveillance audits and 3-year recertification, covering 114 security controls across organizational security, human resources, operations, and access management domains.
ISO 27001 certification demonstrating comprehensive information security management system with third-party audited controls covering organizational security, personnel, network security, application development, and cloud infrastructure across AWS and GCP platforms.
A comprehensive audit report that verifies a service organization's controls related to security, availability, processing integrity, confidentiality, and privacy over a period of time (typically 6-12 months)
SOC 2 Type II attestation report validating security, availability, and confidentiality controls over specified period. Available under NDA upon request from existing customers and qualified prospects through Trust Site portal.
Systematic process for immediately revoking system access upon employee termination, including termination checklists and defined SLAs to prevent unauthorized access and ensure prompt deprovisioning of user accounts.
Immediate access revocation to systems and offices upon employment or contract termination. Automated deprovisioning processes ensure prompt removal of credentials and physical access privileges across all platforms and facilities.
Comprehensive governance framework ensuring continuous business operations through documented recovery procedures, backup strategies, alternative site provisions, and tested incident response protocols for maintaining service availability.
Business Continuity Plan maintained in connection with SaaS applications, reviewed, tested, and updated annually. Program ensures operational resilience across multi-region cloud infrastructure with documented recovery procedures.
Comprehensive recovery framework detailing IT system restoration procedures, recovery time objectives, backup strategies, testing protocols, and incident response measures for maintaining business operations during disruptive events.
Disaster Recovery Plan leveraging multi-region AWS and Google Cloud Platform infrastructure spanning multiple availability zones for redundancy, performance, and disaster recovery. Plan reviewed, tested, and updated annually.
Executive-approved security framework establishing incident detection, analysis, containment, eradication, and recovery procedures with defined roles, communication protocols, and post-incident review processes for effective security incident management.
Established incident management policy defining detection, analysis, containment, eradication, recovery, and post-incident activities. Proactive security investigations documented with customer notifications and transparent incident tracking via Trust Center portal.
Executive-approved governance framework establishing security objectives, risk management approach, and mandatory controls for data protection, access management, incident response, and security awareness across all organizational functions and personnel.
Information Security Policies and Procedures reviewed and acknowledged by employees and contractors during onboarding and annually thereafter. Comprehensive policy framework governing organizational security practices and controls.
Comprehensive privacy policy outlining data collection, processing, storage, and sharing practices, user rights, and privacy safeguards to ensure transparent and compliant data handling practices.
Comprehensive privacy policy detailing data collection, processing, and sharing practices with centralized Privacy Center providing access to privacy information and user rights. Updated privacy notice available with transparent data handling practices.
Organizational policy establishing framework for identifying, assessing, and managing security risks across all business operations, defining risk tolerance levels and mitigation strategies to protect organizational assets and objectives.
Comprehensive risk management process using Open Threat Taxonomy standard for risk assessment across physical, resource, personnel, and technical threat categories. Annual risk reviews with stakeholders, prioritized risk register, and executive-approved mitigation plans.
Organizational policy establishing security requirements and practices throughout the software development lifecycle, ensuring secure coding practices, security testing, and vulnerability management in all software development activities.
Security integrated into software development lifecycle with secure code training, security-focused design reviews, peer code review with security checklists, automated and manual security testing, and vulnerability management tracking.
Advanced encryption standard implementing 256-bit key length for data at rest protection, providing military-grade security for sensitive data storage and ensuring confidentiality of customer information.
All data stores encrypted via Amazon S3 encryption with AWS Key Management Service and Google Cloud Platform encryption through Google KMS. Encryption applied regardless of data classification with IAM roles for encrypt/decrypt permissions based on least privilege.
Legal agreement establishing data processing terms, responsibilities, and safeguards between data controller and processor, ensuring compliance with data protection regulations and defining data handling requirements.
Data Processing Agreement required for technology companies with integrations or access to customer or company confidential data. DPA executed as part of onboarding and contract renewal process ensuring GDPR compliance.
Configurable data retention policies enabling organizations to control data lifecycle, including zero data retention options for compliance requirements and data sovereignty needs.
Customer Data retained during relationship and up to 13 months following expiration or termination. Upon request, Demandbase deletes Customer Data within 30 days of written notification ensuring compliance with data retention requirements.
Pre-employment screening process to verify candidate credentials, criminal history, and employment history, ensuring only qualified and trustworthy individuals are hired for positions involving sensitive data or systems.
Background checks required for all employment offers and third-party contractors with potential data exposure. Checks completed prior to commencing engagement with Demandbase, ensuring personnel security standards across workforce.
Enterprise-grade access controls including multi-factor authentication, single sign-on (SAML SSO), and role-based access controls for comprehensive user management and security.
Multi-factor authentication via identity provider required for all system access. Role-based access controls with periodic reviews, least privilege principles, and deny-all default configuration. Additional authentication layer for VPN and VPC access to AWS infrastructure.
Network-based intrusion detection system (IDS) with specialized detection logic to identify potential security threats, unauthorized access, and anomalous behavior, enabling early detection of attacks and generation of security alerts.
Active threat monitoring with centralized security component monitoring and endpoint protection. Flow and event analytics with threat database correlation enabling real-time threat detection and response capabilities.
Mandatory employee education program covering cybersecurity best practices, threat recognition, and incident reporting, required within 30 days of hire and annually thereafter to maintain security-conscious workforce.
Mandatory security awareness and data privacy training during onboarding with annual refresher training for all employees and contractors. System access revoked for incomplete training. Comprehensive program managed by Security team.
Centralized Security Information and Event Management (SIEM) system for secure storage and continuous monitoring of infrastructure logs, enabling real-time analysis to detect, alert, and mitigate potential security threats promptly.
Centralized log repository for production servers with monitoring tools analyzing network devices, security events, operating system events, resource utilization, user access audits, cloud infrastructure logs, and application operations events.
Transport Layer Security protocol implementing TLS 1.2 or higher for data in transit protection, ensuring secure communication channels and preventing unauthorized interception of customer data during transmission.
Transport Layer Security encryption for data in transit across untrusted networks using Demandbase security standard cipher-suites. Perfect forward secrecy and high entropy for session key generation ensuring unique keys per transport session.
Systematic vendor security assessment process evaluating external parties against industry standard frameworks for security controls maturity, including compensating controls documentation and ongoing security posture monitoring.
Third-party risk management program requiring security questionnaires and Data Processing Agreements for all technology companies with integrations or customer data access during onboarding and contract renewal cycles.
Formal vulnerability management process including regular vulnerability assessments, patch management with documented SLAs, vulnerability prioritization and remediation based on severity levels, and continuous monitoring of security vulnerabilities.
Security issues triaged regularly, prioritized by severity, and tracked to remediation per published SLAs. Static and dynamic application security testing run regularly in production and development environments to detect and flag issues.
Industry-leading Web Application Firewall (WAF) service monitoring web traffic, detecting anomalies, and deploying rulesets to protect online applications from security threats and ensure continued security and availability.
Cloud provider DDOS services and web application firewalls protecting application cloud infrastructure. AI-based threat detection with flow and event analytics correlated with threat databases providing comprehensive layered defense.
Regular independent security assessments conducted by third-party experts to identify vulnerabilities and security weaknesses before exploitation, ensuring ongoing security validation.
Annual penetration tests conducted by independent third-party assessors with continuous internal security testing throughout the year. All identified issues triaged, prioritized by severity, and remediated according to published SLAs. Attestation summaries available under NDA.
$3 million class action settlement with InsideView for allegedly using consumer information without proper consent to promote subscription databases. Involved business contact data including names, contact details, job titles, workplaces, and education histories used for marketing without explicit consumer authorization.
Primary cloud infrastructure provider hosting all application services, databases, and data storage. Critical infrastructure supporting 99.99% uptime requirements with global data residency controls.
Primary cloud infrastructure provider for hosting, storage, global CDN, and AI support services. Spans multiple regions and availability zones for redundancy, performance, and disaster recovery with comprehensive security controls and IAM role-based access management.
Cloud infrastructure provider hosting applications, databases, and data storage. Critical infrastructure supporting compute, storage, and AI/ML services with global data residency controls.
Cloud services provider for data analytics, cloud infrastructure, and AI support services. Multi-region deployment with availability zones for redundancy and disaster recovery. Implements cloud security controls with IAM-based access and encryption via Google KMS.
Cloud infrastructure provider hosting applications, databases, and data storage. Critical infrastructure supporting compute, storage, and AI services with enterprise-grade security and compliance.
Cloud services infrastructure supporting Demandbase platform operations. Provides enterprise-grade security controls, compliance certifications, and global infrastructure for service delivery.
Cloud data warehouse platform hosting structured and semi-structured data. Provides scalable data storage, analytics, and business intelligence for large-scale data processing and analysis.
Cloud data platform providing scalable data warehousing and analytics infrastructure. Supports data processing and analytics capabilities with enterprise security controls and compliance certifications.
Identity management platform providing authentication and authorization services. Enables secure single sign-on, multi-factor authentication, and user lifecycle management across Demandbase applications.
AI language model services for content generation, analysis, and processing. Powers automated content creation, customer support responses, and data analysis features across the platform.
AI automation and support services provider powering intelligent features and automation capabilities within Demandbase platform. Processes data for AI-driven insights and automation workflows.
Customer support services platform used for ticketing and customer relationship management. Handles customer support interactions and service request tracking for Demandbase customers.
Customer service platform managing support tickets, knowledge base, and customer interactions. Processes customer conversations, support requests, and service analytics.
Customer support services platform for ticketing and customer service operations. Manages customer inquiries, support requests, and service interactions across multiple global regions.
Email delivery infrastructure handling transactional and marketing emails. Processes email content, recipient data, and delivery analytics for customer communication and marketing campaigns.
Email delivery service for email campaigns and marketing communications. Provides reliable email infrastructure with delivery tracking and analytics capabilities.
Data catalog services for organizing and managing metadata across enterprise data infrastructure. Provides data discovery, governance, and cataloging capabilities for structured and unstructured data assets.
Data catalog services for organizing and managing metadata across Demandbase data infrastructure. Provides data discovery, governance, and cataloging capabilities for structured and unstructured data assets.
Cloud storage platform for file storage and document management. Provides secure cloud-based content storage, collaboration features, and enterprise file sharing capabilities.
Cloud storage platform for file storage and document management. Provides secure cloud-based content storage with enterprise security controls and collaboration features.
Cloud services provider offering cloud infrastructure consulting and managed services. Supports cloud architecture, migration, optimization, and operations management across multiple cloud platforms.
Cloud services provider offering cloud infrastructure consulting and managed services. Supports cloud architecture, migration, and optimization across multiple regions.
Product analytics platform providing session replay, user behavior analysis, and digital experience insights. Captures and analyzes user interactions for product optimization and UX improvements.
Product analytics platform providing session replay, user behavior analysis, and digital experience insights. Captures and analyzes user interactions for product optimization and UX improvements.
Email validation service providing email address verification and validation. Ensures email deliverability and data quality by validating email addresses in real-time against multiple data sources.
Email validation service providing email address verification and validation. Ensures email deliverability and data quality by validating email addresses in real-time.
Data activation platform enabling identity resolution and data connectivity across marketing technology platforms. Facilitates secure data sharing, identity matching, and activation for marketing campaigns.
Data activation platform enabling identity resolution and data connectivity across marketing technology platforms. Facilitates secure data sharing and activation for marketing campaigns.
Email delivery service for transactional email infrastructure. Provides email API services with sending, receiving, tracking, and analytics capabilities for application emails and notifications.
Email delivery service for transactional email infrastructure. Provides email API services with sending, receiving, and tracking capabilities for application emails and notifications.
AI support and services platform for product analytics and user guidance. Provides in-app messaging, product usage analytics, feature adoption tracking, and AI-powered product insights.
AI support and services platform for product analytics and user guidance. Provides in-app messaging, product usage analytics, feature adoption tracking, and AI-powered product insights.