Security

Enterprise Grade Security at 4Degrees

At 4Degrees, we prioritize the security and privacy of our clients' data. Recognizing the importance of protecting sensitive information, we have implemented rigorous security protocols.

Talk to Sales

Trusted by hundreds of teams in the private markets.

Top-TierData Security and privacy for the Enterprise

Data Security

Data Encryption

Encryption at Rest: All data stored in our PostgreSQL database on the Google Cloud Platform is encrypted using industry-leading algorithms.

Encryption in Transit: Data transmitted between users, servers, and third-party providers is encrypted with Transport Layer Security (TLS). 

Access Controls

Access Controls

User Account Security: User passwords are hashed and salted. Additionally, OAuth credentialing is used to access by Gmail and Office 365 email accounts.

Two-Factor Authentication (2FA): SMS-based adds an extra layer of security.

SAML-based Single Sign-On (SSO): We support SAML-based SSO, and OKTA allowing users to access 4Degrees with their existing enterprise credentials.

Compliance

Compliance

GDPR Compliance: We adhere to the General Data Protection Regulation (GDPR) requirements, ensuring that all personal data is collected, processed, and stored in compliance with EU regulations. 

CCPA Compliance: We comply with the California Consumer Privacy Act (CCPA).

CASA Tier 2: We have achieved CASA Tier 2 verification, ensuring rigorous security standards through independent assessment and validation.

Employee Training, Access and Security Audits

Employee Training, Access and Security Audits

Employee Access Controls: Access to user data is restricted and based on the principle of least privilege.

Regular Training: Our employees undergo regular training on security best practices.

Annual Security Audits: We undergo comprehensive 3rd-party security audits to ensure our systems and practices remain secure.

Application Security

Application Security

API Security: We implement robust authentication mechanisms, such as OAuth and API keys, and enforce HTTPS for secure data transmission.

Input Validation: We perform rigorous input validation to prevent SQL injection, XSS, and other common vulnerabilities.

Relationship management was a huge differentiator for 4Degrees versus other CRMs.

Ashley Kegan
Director of Corporate Development

Security FAQs

How Does 4Degrees Protect our Sensitive Deal and Relationship Data?

4Degrees prioritizes data privacy and security at every layer of the platform.

Sensitive data, including emails and calendar information, is encrypted both in transit and at rest. Passwords are salted and hashed, and OAuth is used to access Gmail and Office 365 accounts without storing passwords.

All systems are hosted on Google Cloud Platform, which meets best-in-class physical and infrastructure security standards.

Can we Control User Access and Permissions Across Teams?

Yes. 4Degrees offers user- and organization-level settings to help you manage access and visibility.

You can configure role-based permissions to control who can view, edit, or export sensitive data, ensuring compliance with internal governance and data protection requirements.

How is our Data Encrypted and Backed up?

All data stored in 4Degrees is encrypted before being transmitted to the database.

At rest, data is encrypted in PostgreSQL on Google Cloud. In transit, all communication is encrypted using TLS. These practices ensure that your data is secure from unauthorized access.

Is 4Degrees Cloud-Based or Available for On-premise Hosting?

4Degrees is a cloud-based platform hosted on Google Cloud Platform. This enables scalability, availability, and robust infrastructure security. We do not offer on-premise hosting.

Can we Run a Security Review or Request Documentation for IT and Procurement?

Yes. 4Degrees undergoes a comprehensive third-party security audit annually and performs periodic vulnerability scans to ensure its systems are secure. Certificates and documentation are available upon request to support your IT, compliance, or procurement evaluations.

Getting Started is Simple:

Level up your Productivity

Request a Demo