37° 48' 15.7068'' N, 122° 16' 15.9996'' W
cloud-native gis has arrived
37° 48' 15.7068'' N, 122° 16' 15.9996'' W
cloud-native gis has arrived
37° 48' 15.7068'' N, 122° 16' 15.9996'' W
cloud-native gis has arrived
37° 48' 15.7068'' N, 122° 16' 15.9996'' W
cloud-native gis has arrived
37° 48' 15.7068'' N, 122° 16' 15.9996'' W
cloud-native gis has arrived
37° 48' 15.7068'' N, 122° 16' 15.9996'' W
cloud-native gis has arrived
37° 48' 15.7068'' N, 122° 16' 15.9996'' W
cloud-native gis has arrived
37° 48' 15.7068'' N, 122° 16' 15.9996'' W
cloud-native gis has arrived
37° 48' 15.7068'' N, 122° 16' 15.9996'' W
cloud-native gis has arrived
37° 48' 15.7068'' N, 122° 16' 15.9996'' W
cloud-native gis has arrived
Maps
Engineering
SOC 2 certified: Felt’s enterprise-grade security infrastructure
Felt has always followed rigorous industry best practices to keep your data safe an secure. Today, we’re announcing a huge milestone: We’re SOC 2 compliant.
Felt has always followed rigorous industry best practices to keep your data safe an secure. Today, we’re announcing a huge milestone: We’re SOC 2 compliant.

At Felt, we are revolutionizing the way teams work by making it easier to visualize, analyze and share maps on the web, securely. The data you upload to our platform is yours alone, and we ensure of that by maintaining the highest level of security for your data. Today, we are pleased to announce that we are SOC 2 Type 1 certified!

A rigorous audit process to validate our protocols

SOC 2, or Service Organization Control 2, is the gold standard for security compliance. While Felt has always implemented state-of-the-art security procedures and protocols, SOC-2 certification comes from a third-party audit and validates that we meet strict guidelines for handling your data.

Earning our SOC 2 certification involved a meticulous audit of our infrastructure, software, personnel procedures, and customer data policies. Auditors confirmed that we are in-keeping with world class standards, including: maintaining comprehensive records of employee information, ensuring proper handling and storage of user data, and implementing robust security measures for all our vendor engagements.

Our commitment to security goes beyond manual checks; a substantial part of our audits are now automated. We also monitor our employees’ personal computers hourly and have systems in place to check the permissions of our data storage every hour. Your data's safety is not just a goal; it's a continuous process.

Enterprise-grade data protection for all users

Whether your organization is small or large, your data privacy concerns remain the same. We have implemented robust measures to meet enterprise-grade data protection expectations for all of our users. Here are some more details about our security infrastructure.

  • Your data is encrypted: All customer data uploaded to Felt is stored in an encrypted format, assuring that the integrity and confidentiality of data are maintained. Felt employees can only access customer data for documented reasons and for a limited time, adding an extra layer of security.
  • All of Felt's servers are located in the US. We leverage the security solutions provided by top-tier cloud vendors such as Render and AWS. Render's services are utilized in their Oregon, US data center, while AWS serves us through its US data centers. Both Render and AWS have SOC 2 Type 2 compliance and ISO 270001 certification, meaning they are rigorously audited by third parties.
  • Secure Authentication: For organizational efficiency, we offer users the option to sign in using their Google accounts instead of creating a password. This transforms Google into your Single Sign-On provider, ensuring streamlined access to Felt while maintaining robust security.
  • Strict security protocols regulate customer data access: Only authorized Felt employees have access to critical infrastructure and are required to use designated accounts that are protected by two-factor authentication. Felt employees are strictly prohibited from accessing the Render and AWS data centers physically, which helps mitigate any risks related to physical intrusion.

Felt's promise is that your data always belongs to you, and you control exactly who has access to it. These are just some of the protocols that we've put in place to deliver on that.

Our ongoing commitment

We know your data isn't just data; it's the core of your business. Our goal is to empower you to maximize its potential while ensuring it remains secure. We want to help you make the most out of your data while giving you the assurance that it’s safe and secure with us. As we grow and expand, the SOC 2 certification helps us maintain a strong security posture and effectively manage our data to protect the interests and privacy of our customers.

Obtaining SOC 2 Type 1 certification is a significant accomplishment that confirms the excellence of our practices and protocols. It also sets us on the path to achieving SOC 2 Type 2 certification. We are currently undergoing audits to attain SOC 2 Type 2 certification, which means we will continue to demonstrate over time that our operations are not only secure, but consistently secure.

Learn more

For a deep dive into our security and privacy protocols, visit our security page. If you’re a Felt customer and would like a copy of our SOC 2 report, please don’t hesitate to email us at support@felt.com.

If you’re considering bringing Felt to your team or organization, you can book a demo or reach out to our dedicated sales team at sales@felt.com who’s ready to answer any questions you might have about security or any other aspect of our product.

Explore the platform now.

Bio
LinkedIn
More articles

Add maps to Power BI reports & dashboards with Felt

Simplicity meets power: Felt’s H3 spatial index support has arrived

Understanding spatial indexes: H3 explained