Smarsh Trust

Providing trust and confidence on a global scale.

Security and compliance

Smarsh is trusted by enterprises large and small to protect their data and electronic communications. Smarsh’s security model leverages industry standard technical and organizational controls to meet the needs of our customers.

  • Secure configuration using industry standard benchmarks
  • Data encryption, both in transit and at rest
  • Authentication, single sign-on and multi-factor identification
  • Proactive performance and security monitoring, including vulnerability management and remediation
  • Regular independent application and network security penetration testing
  • Robust business continuity and disaster recovery programs, including periodic testing for effectiveness
  • Physical and logical data center access controls;
  • Third-party audits using industry standard control frameworks (e.g., ISO, SOC)


Privacy is important to Smarsh. For more information about Smarsh’s privacy policies, please request Security Documentation and review our website privacy policy.

Information Security & Security Incidents

We take security incidents very seriously. Contact with any security questions, reports of vulnerabilities, or if you become aware of a security incident, or reasonably believe that a security incident occurred.