Comprehensive Security To Protect Your Strategic Information, Users & Privacy

Enterprise Security Comes Standard

ClearPoint employs a cloud deployment model with industry-standard security controls including firewalls, intrusion detection, and rigorous change management processes. Our distributed architecture scales horizontally to meet growing demands while maintaining peak security.

All critical processes in our production environment are documented and automated. We follow formal change management procedures with testing in separate environments before any production deployment.

Your data are stored in fully redundant databases with daily encrypted backups using AES-256 encryption, stored in geographically separated locations for maximum resilience.

Want more information on security?
Schedule a security review
SOC2 Type 2 Certified and ISO 27001 Aligned
Third-party validated security standards and regular independent audits demonstrate our commitment to maintaining the highest levels of data protection and operational excellence.
Compliance with Global Privacy Regulations
Comprehensive data protection compliance across global privacy regulations, ensuring your users' personal information is handled with transparency, consent, and full regulatory adherence.
Enterprise-Grade Authentication Options
Flexible, enterprise-grade access management that seamlessly integrates with your existing security infrastructure while providing granular control over who sees what in your ClearPoint instance
Resilient, Redundant, and Secure Infrastructure
Military-grade encryption, redundant infrastructure, and continuous monitoring create multiple layers of defense to protect your strategic data with industry-leading reliability and performance.
G2 2024 LeaderG2 2024 Best Support G2 2024 Users most likely recommendG2 2024 Best meets requirementsG2 2024 Easiest to do business withG2 2024 High Performer
scalable security

Security That Scales With Your Organization

ClearPoint delivers comprehensive security while enabling seamless collaboration across your organization

Advanced Authentication

Secure your ClearPoint instance with multiple layers of authentication protection:

  • Two-Factor Authentication (2FA)
  • SAML-based Single Sign-On (SSO)
  • Active Directory integration
  • Customizable password policies
  • Session timeout controls

Element-Level Permissions

Our unique granular permission system ensures users see exactly what they need:

  • Role-based access control (RBAC)
  • Element-specific permissions
  • Department-level data isolation
  • Custom user groups and rules
  • Audit trails for all access

Data Encryption

Industry-standard encryption protects your data at every stage:

  • AES-256 encryption at rest
  • TLS 1.3 for data in transit
  • Encrypted database backups
  • Secure API communications
  • End-to-end encryption options

Compliance & Auditing

Meet regulatory requirements with comprehensive compliance features:

  • Complete audit logging
  • Data retention policies
  • GDPR data portability
  • Right to erasure support
  • Compliance reporting tools

Security Monitoring

Proactive security measures to protect against threats:

  • 24/7 system monitoring
  • Intrusion detection systems
  • Regular penetration testing
  • Automated threat detection
  • Security incident response team

Business Continuity

Ensure your data are always available and protected:

  • Redundant data centers
  • Automated daily backups
  • Disaster recovery planning
  • 99.9% uptime SLA
  • Geographic data replication

Frequently Asked Questions

Find answers to your questions right here, and please don’t hesitate to contact us if you can’t find what you’re looking for.

What security certifications does ClearPoint have?

ClearPoint is SOC 2 Type II certified, demonstrating our commitment to security, availability, and confidentiality. We're also GDPR and CCPA compliant. For a copy of our SOC 2 report or additional compliance documentation, contact support@clearpointstrategy.com.

How is my data encrypted?

All customer data is protected with AES-256 encryption at rest and TLS/HTTPS encryption in transit over public networks. This military-grade encryption ensures your strategic information remains secure at all times.

What kind of backup and disaster recovery do you have?

We store all client data in fully redundant databases with daily and intraday backups, encrypted with AES-256 and stored in geographically separated locations. Our architecture includes complete redundancy across load balancers, storage units, and processing engines, with data always written to two separate locations.

How do you handle security incidents?

We maintain a robust Security Incident Response Process (SIRP) with defined severity criteria, investigation workflows, and escalation procedures. Critical issues are remediated immediately, and affected clients are notified promptly through their Account Manager.

What authentication options are available?

ClearPoint supports Two-Factor Authentication (2FA), SAML-based Single Sign-On (SSO), and integration with identity providers like Active Directory, Okta, and Azure AD. Access to client data is restricted to legitimate business use only with role-based permissions.

How do you monitor and maintain security?

We use enterprise application management solutions for 24/7 system monitoring, with automated alerts for security events. Our systems track network resources, operating systems, and applications continuously, scaling automatically when capacity thresholds are reached.

How are your employees trained on security?

All employees undergo background checks and receive security training during onboarding. Annual security and privacy training is mandatory for all staff, with additional specialized training for those handling client data. All employees must acknowledge our Information Security Policy.

What is your change management process?

We follow formal change management procedures where all changes are tested in separate environments and reviewed by Engineering and Technical Support before production deployment. All changes are tracked, documented, and approved through regular change management meetings.

How do you ensure business continuity?

Our Business Continuity Planning (BCP) and Disaster Recovery (DR) processes prioritize critical functions. With our distributed cloud architecture, redundant infrastructure, and geographically separated data centers, we maintain high availability and can quickly recover from any disruption.

How often do you update your security practices?

We follow an agile development methodology with security testing throughout the entire lifecycle. Our Information Security Policy is reviewed and updated annually, and we conduct regular third-party penetration testing to identify and address potential vulnerabilities.

Can I restrict access to specific data within my organization?

Yes, ClearPoint offers element-level permissions that allow granular control over who can see and edit specific data. You can create custom roles, department hierarchies, and access policies that match your organizational structure.

How can I get more security information?

For detailed security documentation, SOC 2 reports, or specific compliance questions, please contact our security team at support@clearpointstrategy.com.

book a free demo
In Just 30 Min, We’ll Show You
How ClearPoint Secures Your Data

(without tying your team up in knots)

Watch ClearPoint turn fragmented data into clean, decision-ready dashboards.
See how AI, scorecards, and team views keep reports visible and actionable.
Ask anything about frameworks, workflows, or custom views, we’ll show you LIVE on your reporting structure!

We shared a mess of spreadsheets. They helped turn it into a structured, live reporting system with owners and goals. We didn’t expect to get that far in 30 minutes."

Monica C.
Strategic Planning & Performance Manager

Talk to a strategy expert!

Based on 150+ customer reviews
SOC 2 Type 2 Certified5-Star G2 RatingSilver Stevie Award WinnerG2 Top 50 Project Management Software5-Star Capterra RatingELGL Haverford Award Winner