Your data is secure with Wrapbook

At Wrapbook, we’re on a mission to empower the project economy. That starts with building a foundation of security and trust.

Always compliant

Premium partners

Our platform and data center partners Heroku & AWS are both ISO 27001 and SOC 2 Type 2 certified

Third party audited

Wrapbook maintains SOC 1 compliance and is partnered with a third-party auditor to continue advancing our compliance posture suite of certifications.

Secure financial transactions

We work with secure PCI DSS partners to execute payroll transactions.

Ultimate protection for your information.

Data encryption in transit & at rest

All data at-rest is secured using AES 256-bit encryption.  TLS and forced HTTPS are implemented for data in-transit.

Multi-factor authentication

An additional layer of security to your online profile. Also enforced for all Wrapbook employees.

Privacy First

We do not share client data unless required to perform the required services.

We’re built to be secure

Online monitoring

All sessions, from user interactions to general system activity, are logged and recorded, allowing our team to respond and investigate suspicious activity with efficiency.

Data backup and recovery

Backups are conducted and replicated daily for disaster recovery.

Strict access controls

Profiles within client projects have limited information based on role.

Constant app development

Secure development lifecycle

Production and test environments are isolated and client data is never used in development.

Third-party penetration testing

Regular penetration testing ensures infrastructure and the application exceed industry hardening standards.

CI/CD structure

Our CI-CD process ensures a secure and stable application with features clients want and need.

We hold ourselves to the highest standard.

24/7 monitoring

A specialized team of Engineers stand ready to troubleshoot any problems, respond to potential incidents and safeguard optimal uptime.

Separation of duties

Security is top of mind for all employees. Our team leverages the zero-trust principles of least privilege, and need-to-know.

Diligent HR process

Background checks on all employees and contractors.  Mandatory security awareness training and non-disclosure agreements.