Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Overview

Warmly was awarded the 2021 Zoomtopia Innovation award for best use of our platform and externally is named a top 3 Zoom App. Additionally, the Zoom Apps Fund has invested directly in Warmly. If you have any questions that are not addressed on this page, please reach out to us at security@warmly.ai and we'd be happy to help ASAP! (scroll for more info)

Company admins are often required to approve Zoom Apps before individual users at their company can download Warmly. Our CEO Max made a quick video sharing how easy it is to complete that approval process: https://www.loom.com/share/1c9ef40181504b75ae541a33e877e759

Warmly has established its security program based on industry best practices and has policy that defines the actions required to secure Warmly, both technical and non-technical. We have an established governance model that includes operations, engineering, and senior leadership in order to address security threats and effectively communicate security within our organization and to our clients.

Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
SOC 2 Logo
SOC 2
Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Warmly is reviewed and trusted by

GainsightGainsight
Zoom Video CommunicationsZoom Video Communications
ChargebeeChargebee
OptimizelyOptimizely
NINI
SendosoSendoso
AppsFlyerAppsFlyer
GitHubGitHub
17 Documents
Network Diagram
Pentest Report
Security Whitepaper
SOC 2 Report
Vulnerability Assessment Report
CAIQ
Acceptable Use Policy
Business Continuity Policy
Data Classification Policy
Data Security Policy
General Incident Response Policy
Information Security Policy
Software Development Lifecycle

Product Security

Role-Based Access Control
Audit Logging
Data Security
See more

Reports

Network Diagram
Pentest Report
Security Prospectus
See more

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Firebase
Google Cloud Platform
Heroku

Endpoint Security

DNS Filtering
Mobile Device Management
Threat Detection

Corporate Security

Employee Training
Incident Response
Internal Assessments

Policies

Acceptable Use Policy
Business Continuity Policy
Data Classification Policy
See more

If you think you may have discovered a vulnerability, please send us a note.