Everything your security team needs — in one place.
SOC 2 Type II report, HIPAA BAA, GDPR DPA, sub-processors, pen-test summary, architecture diagram, and pre-filled security questionnaires. No procurement back-and-forth.
Typical turnaround under one business day. Mutual NDA where applicable.
The SyncRivo Trust Pack
Six artifacts that compress an enterprise security review from weeks to days. Request individually, or get the full pack.
SOC 2 Type II Report
Full report covering Security, Availability, and Confidentiality. Available under mutual NDA — typical turnaround under one business day.
Request SOC 2 ReportHIPAA Business Associate Agreement
Pre-reviewed BAA template for healthcare and life-sciences buyers. Signed before any Protected Health Information is processed.
Start BAA ProcessGDPR Data Processing Agreement
GDPR Article 28 DPA available to all customers. EU customers can elect EU-region routing for in-region transit.
Request DPASecurity Questionnaire Pre-Fill
Pre-completed CAIQ Lite and SIG Lite responses. Saves your security team 8–12 hours of vendor due-diligence work.
Request Questionnaire PackPenetration Test Summary
Annual third-party penetration test. Redacted summary of scope, methodology, findings, and remediation status.
Request Pen-Test SummaryArchitecture & Data-Flow Diagram
How a message enters, transforms, and exits SyncRivo without being persisted. The diagram auditors actually want.
View ArchitectureHow a message moves through SyncRivo
The architecture that makes "zero data-at-rest" verifiable, not aspirational.
- 1Webhook in (signed, TLS 1.3)
Source platform sends a signed event. Unsigned or malformed events are rejected before any processing.
- 2In-memory routing
Routing rule resolved. The message payload exists only in process memory — never written to disk, never logged.
- 3In-memory transform
Mentions, threads, attachments, reactions translated to the target platform schema inside the same request.
- 4Delivery via official API
Sent over TLS using short-lived, scoped OAuth 2.0 tokens stored in an encrypted credential vault.
- 5Audit event, no content
Immutable audit log records timestamp, hashed channel IDs, status, and latency — never message content.
Operational Transparency
Status, sub-processors, disclosure, and policy — public, dated, change-logged.
Live Status Page
Real-time uptime, incident history, and post-mortems. Subscribe for incident notifications.
ViewSub-Processors List
Public list of every sub-processor we use, with location, purpose, and last review date.
ViewVulnerability Disclosure
Coordinated disclosure program. Email security@syncrivo.ai. 24-hour triage, 48-hour critical patches.
ViewIncident Response Policy
How we detect, triage, and notify. 72-hour notification under GDPR Article 33.
ViewData Retention Policy
What we keep, what we never keep, and for how long. Messages: zero. Audit metadata: 12 months default.
ViewCompliance Detail Pages
For each framework, a dedicated page with scope, controls, and evidence.
Procurement & Security FAQ
The questions every enterprise security review asks — answered in advance.
Ready to move past the security questionnaire?
Tell us which artifacts you need. We will send the trust pack and a scoped NDA in one reply — typically within one business day.