Our commitment to security and trust.

Handle uses enterprise level security practices throughout the entire organization at all times.

AICPA Service Organization Control Reports® logo
Handle + AICPA SOC 2 Compliant
SOC 2 TYPE 2 COMPLIANT

Highest Security Certifications.

Security and Privacy are top priorities at Handle, and we develop all of our products with the highest security standards. Handle is officially Service Organizational Control (SOC) 2 Type 1 and (SOC) 2 Type 2 compliant to ensure your sensitive data is safe at all times.

Security & Trust
Security & Trust

Enterprise-level
Security Standards.

Handle uses enterprise-level security practices and undergoes regular penetration testing and security audits to ensure our customers are protected at all times.

Compliance Monitoring

Handle ensuring robust security through comprehensive policy monitoring

Infrastructure security

  • Service infrastructure maintained

  • Intrusion detection system utilized

  • Production database access restricted

View all 16 controls

Organizational security

  • Portable media encrypted

  • Anti-malware technology utilized

  • Employee background checks performed

View all 10 controls

Product security

  • Penetration testing performed

  • Data encryption utilized

  • Data transmission encrypted

View all 5 controls

Internal security procedures

  • Vulnerabilities scanned and remediated

  • Access reviews conducted

  • Incident response plan tested

View all 18 controls

Data and privacy

  • Privacy policy established

  • Customer data deleted upon leave

  • Data retention procedures established

View all 9 controls

Meet the construction enterprises already optimizing their processes using Handle

Oldcastle Handle + Oldcastle
LONG Building Technologies Handle + LONG Building Technologies
HOLT CAT Handle + HOLT CAT
TEICHERT TEICHERT
H&E Equipment Services H&E Equipment Services
EquipmentShare Equipment Rental EquipmentShare Equipment Rental

Bug Bounty Program

Handle offers a bug bounty program if an
exploitable vulnerability is found. Click below to
submit a report.

Submit Report