Springshot Security Profile

CATEGORY

Analytics

Organization Details

What is

Springshot

?

Springshot helps mobile teams coordinate and perform time-sensitive tasks. Through automation, integrations, AI and beautiful design, Springshot will prepare your crew for success and inspire them to deliver their very best..Springshot synchronizes operations. Through integrations, recurring events and impromptu requests, Springshot converts raw data into choregraphed work plans for mobile teams..Springshot breaks the mold – and ignites engagement – by providing mobile teams with a platform they want to use. Better engagement equals better data. Through custom APIs and reporting, Springshot mines that data to optimize workflows and recognize success..Springshot was designed by operators for operators. Springshot’s customer specialists have decades of practical experience, understand change management and are ready to deliver a seamless deployment. Whether teams start small or go big, they rest easy knowing they’re in good hands with Springshot’s flexible and personalized approach..Springshot works across multiple industries to equip task-based teams to put their best feet forward.Springshot Optimizes People Moving at Super Bowl LV

HEADQUARTERS

HOSTING

HOSTING LOCATION

SUBDOMAINS

  • mail.springshot.com
  • feeds.springshot.com
  • elevate.springshot.com
  • webapp.springshot.com
  • api.springshot.com
  • www.springshot.com
  • ftp.springshot.com

CURRENT USERS IN YOUR ORG

Start a trial to find out

Security Program

SECURITY PAGE

SECURITY PORTAL

BUG BOUNTY

VULNERABILITY DISCLOSURE

TERMS OF SERVICE

PRIVACY POLICY

STATUS PAGE

SECURITY CERTIFICATIONS

SOC2 Compliance
PCI Compliant
HIPAA Compliant
SOC2 Compliance
SOC 2 Compliant
GDPR Compliant
ISO 27001 Compliant
FedRamp Compliant
CSA Star Level 1
Compliant

supply chain

  • Webflow
  • Amazon Web Services (AWS)
  • Google Workspace
  • Statuspage
  • Google Analytics
  • Google Tag Manager

Authentication

AUTHENTICATION / SSO

Supported Okta Features
Login with Google support
Login with Microsoft support
Supports SSO
Two-factor authentication via SMS
Two-factor authentication via E-mail
Two-factor authentication via Hardware
Two-factor authentication via Software
Two-factor authentication via TOTP
Two-factor authentication via U2F

OAUTH GRANTS in your org

Start a trial to find out

oauth details

Stop worrying about shadow IT security risks.

With an unrivaled, patented approach to SaaS discovery, Nudge Security inventories all cloud and SaaS assets ever created across your organization on Day One, and alerts you as new SaaS apps are adopted.