Security Trust Page

Start your security review
View & download sensitive information
Ask for information
Search items
ControlK

Overview

Extole is the Customer-Led Growth platform. With Extole, marketers fight skyrocketing paid media costs by turning their customers into a primary vehicle for acquisition, awareness, and activation. With Extole’s SaaS platform and experts, marketers rapidly launch programs such as refer-a-friend influencer, and challenges, personalized to important behavioral segments. Customer-Led Growth drives revenue and generates an important and unique source of first-party data.

In order to protect our customers and their data, Extole has implemented a formal information security management program that governs various aspects such as software development, infrastructure operation, administration, and delivery of the My.Extole product application.

If you have any questions regarding security and privacy at Extole not covered on this page, don't hesitate to get in touch with us at security@extole.com

Compliance

CCPA Logo
CCPA
CPRA Logo
CPRA
EU-US DPF Logo
EU-US DPF
GDPR Logo
GDPR
ISO 27001 Logo
ISO 27001
Privacy Shield Logo
Privacy Shield
TRUSTe Logo
TRUSTe
Start your security review
View & download sensitive information
Ask for information

Extole is reviewed and trusted by

Discover-company-logoDiscover
KeyBank-company-logoKeyBank
Intuit-company-logoIntuit
Estée Lauder-company-logoEstée Lauder
QVC-company-logoQVC
Levi's-company-logoLevi's
BECU-company-logoBECU
Visions Federal Credit Union-company-logoVisions Federal Credit Union
Princess Cruises-company-logoPrincess Cruises
Ahold Delhaize-company-logoAhold Delhaize

Documents

Network Diagram
Pentest Report
ISO 27001
Cyber Insurance
BC/DR
Information Security Policy
Other Reports
Vulnerability Assessment Report
TRUSTe
Product Architecture
Software Development Lifecycle
Data Processing Agreement
Service-Level Agreement
Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
BYOD Policy
Data Classification Policy
Data Security Policy
Encryption Policy
General Incident Response Policy
IMS Policy
Internal and External Communication Policy
Network Security Policy
Other Policies
Password Policy
Physical Security
Risk Management Policy
Software Development Lifecycle
Third Party Personnel Policy
Vulnerability Management Policy

Risk Profile

Data Access Level
Impact Level
Recovery Time Objective
View more

Product Security

Audit Logging
Data Security
Integrations
View more

Reports

Network Diagram
Other Reports
Pentest Report
View more

Self-Assessments

Other Self-Assessments

Data Security

Access Monitoring
Backups Enabled
Data Erasure
View more

App Security

Code Analysis
Software Development Lifecycle
Vulnerability & Patch Management
View more

Data Privacy

Cookies
Data Privacy Officer
Employee Privacy Training

Access Control

Data Access
Logging
Password Security

Infrastructure

Status Monitoring
Amazon Web Services
Anti-DDoS
View more

Endpoint Security

Disk Encryption
Mobile Device Management

Network Security

Data Loss Prevention
Firewall
IDS/IPS
View more

Corporate Security

Asset Management Practices
Email Protection
Employee Training
View more

Policies

Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
View more

Security Grades

SecurityScorecard
Extole
Security Scorecard A grade
Qualys SSL Labs
My.Extole.com
A

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo