SOC 2 Type II Certification — View Report
GDPR Compliance
CCPA Compliance
Regular vulnerability scans on systems
Frequent third party penetration testing
Control environment
Risk assessment
Control activities
Information and communication
Monitoring
Industry-standard secure transport protocols
Data Loss Protection integrations
Asset Management
SSL Encryption for customer data
Data access and authorizations based on the principle of least privilege
Mandated strong passwords with audit logging that allows administrators to see when users last logged in and when passwords were last changed.
Restricted access to the AWS production system to authorized personnel, carried out using encrypted connections with multiple factors of authentication
Acceptable Use
Access Control
Asset Management
Business Continuity and Disaster Recovery Plan
Change Management
Code of Conduct
Cryptography
Data Management
Human Resource Security
Incident Response
Information Security
Operations Security
Password
Privacy
Risk Management
Secure Development
Third Party Management
Got more questions? Email us at support@allvoices.co and we'll respond ASAP.
View All FAQsIt depends on how complex your setup is, but we'll make sure it launches by the date you need it by.
Our pricing depends on a few factors, such as the features being purchased and the number of employees at your company. For more information, check out our pricing page.
Check out our full list of integrations here.
Yes! We built our tool to be customizable so that you can ask your employees questions that are relevant to your business.