Sendmarc security and privacy overview

At Sendmarc, security is at the core of what we do. We help our partners and customers improve their security and compliance by solidifying our own. We do this by applying powerful security controls and maintaining strong compliance.

The Sendmarc security principles

  • Access is granted only when necessary, following strict least-privilege rules.
  • Security is layered and consistently applied across all systems.
  • Controls are continuously improved to enhance effectiveness and reduce friction.

Our Trust Center

Sendmarc’s Trust Center gives partners, customers, and prospects a clear, real-time view of our security posture and compliance credentials. It highlights our certifications – like SOC 2 and ISO 27001 – and reinforces our commitment to transparency and best-in-class email security. It also showcases our DMARC Certified status, providing peace of mind that we follow the same high standards we help our customers achieve.

Security and compliance at Sendmarc

Sendmarc is SOC 2 Type II and ISO 27001 compliant; we also hold a high resilience result from CY3Rn.

Service providers

Sendmarc partners with internationally recognized organizations to support critical functions such as infrastructure management, communication, and hosting. These trusted service providers meet strict standards, helping us maintain the highest levels of security and reliability for our platform.

Sendmarc security controls

Sendmarc maintains security controls to protect your business’s data and ensure the integrity of our services.

Infrastructure security

We protect our infrastructure with strict access controls, strong encryption, and secure authentication. Only authorized personnel can access sensitive systems, and all data is encrypted at rest.

Organizational security

Our team operates under clear security policies. All employees sign confidentiality agreements, acknowledge a code of conduct, and use centrally managed, protected devices. We also enforce secure visitor and asset disposal procedures.

Product security

Security is integrated into our operations. We conduct regular control assessments, encrypt all data transmissions, and continuously monitor for vulnerabilities.

Internal security procedures

We maintain internal processes, including business continuity and disaster recovery plans, a whistleblower policy, and regular board oversight. Our incident response and risk management programs ensure we’re prepared for any scenario.

Data and privacy

Customer data is handled with care and protected by strict retention, deletion, and classification policies to ensure confidentiality and compliance at all times.

For a detailed look at our security policies, controls, and certifications, please visit our Trust Center: