Join The Herd
Start transforming your trainings at the click of a button.
Protecting your data is foundational to everything we build. Herd is designed with security at every layer so you can trust us with your most sensitive workflows. SOC 2 Type II certification currently in progress.
Security is not an afterthought - it is embedded into our architecture, processes, and culture.
All data is encrypted with AES-256 at rest and TLS 1.3 in transit. Encryption keys are managed through dedicated key management services with automatic rotation.
Role-based access control (RBAC) with SSO integration and MFA enforcement. Least-privilege access is applied across all systems and services.
Hosted on AWS with SOC 2-compliant infrastructure. Multi-region redundancy, automated backups, and network isolation protect against outages and unauthorized access.
Continuous monitoring across all systems with centralized audit logging. Anomaly detection and real-time alerting ensure rapid identification of potential threats.
Defined incident response procedures with clear escalation paths. We commit to breach notification within 72 hours and conduct post-incident reviews for every event.
All third-party vendors undergo rigorous security assessments. We maintain a public subprocessor list and conduct regular reviews of vendor security posture.
Herd is designed to help organizations meet their compliance obligations across multiple frameworks. Our security program is independently audited and continuously monitored.
Currently pursuing SOC 2 Type II certification. Controls covering security, availability, and confidentiality are being independently audited.
Compliant with California Consumer Privacy Act requirements for data transparency, access rights, and deletion requests.
Access in-depth security documentation available to Herd customers.
Full audit report covering security, availability, and confidentiality trust service criteria for the past 12 months.
Summary of findings from our most recent third-party penetration test, including remediation status and timelines.
Our standard DPA covering data processing terms, subprocessor lists, and cross-border transfer mechanisms.
Technical deep-dive into Herd's security architecture, data flows, encryption schemes, and isolation boundaries.
Pre-filled SIG Lite and CAIQ questionnaires to streamline your vendor risk assessment process.
Sample audit log exports and documentation on log retention policies, formats, and integration options.
Start transforming your trainings at the click of a button.