Talk to us if you have questions
Curious about how we keep your data safe? Questions or security concerns? Shoot us an email at legal@catalogy.com. Learn more about Catalogy by reading our Terms of service and Privacy policy.
We comply with global data protection and security frameworks. Catalogy complies with all applicable privacy and data protection laws, including GDPR and CCPA. Learn more about our approach to privacy here.

Single Sign-on (SSO) allows you to authenticate users in your own systems without requiring them to enter additional login credentials.
We respect every persona’s rights to privacy and data security. We process and store data in compliance with GDPR regulations.

Two-factor authentication (2FA) is a security measure that requires users to provide two forms of authentication to access sensitive data and resources. Catalogy’s 2FA adds an extra layer of security to user accounts by requiring a second factor in addition to the standard username and password. This makes it more difficult for attackers to gain access to sensitive data and resources, even if they manage to obtain a user's password.
Catalogy uses Role-Based Access Control (RBAC) to assign permissions based on user roles—Owner, Administrator, Editor, Agent, and Contributor—ensuring each user has the appropriate access level for secure and efficient operations.

Product & Platform Security at Catalogy means building trust by design: protecting data, safeguarding content, and ensuring a safe, reliable experience for every user.
Flipbook password-protected pages are a simple but effective way to restrict access to sensitive data and resources. Password-protected pages require users to enter a password to access the content, adding an extra layer of security. Passwords should be strong and complex, and users should be required to change their passwords periodically to reduce the risk of unauthorized access.
At Catalogy, code analysis is a critical component of our secure development process. We employ both static and dynamic code analysis techniques to identify and address vulnerabilities early in the development lifecycle
At Catalogy, credential management is a top priority to ensure the security of our users' information. We implement stringent policies and best practices for handling and storing credentials. This includes using strong encryption methods, enforcing multi-factor authentication, and regularly rotating passwords.
Catalogy's Secure Development Policy ensures that security is embedded into every stage of our product development lifecycle. We follow industry best practices and conduct regular security assessments to identify and mitigate potential vulnerabilities.
An SSL (Secure Sockets Layer) certificate is a digital certificate that encrypts data exchanged between a web server and a web browser. SSL certificates ensure that sensitive information, such as login credentials and payment information, is transmitted securely over the Internet. Catalogy ensures that our website has an SSL certificate to protect user data from interception by attackers.
Custom domain security settings allow Catalogy’s enterprise users to control who can access their website from specific domains or IP addresses. This feature can be useful for organizations that want to restrict access to their website from certain locations, such as countries or regions where they do not do business. Custom domain security settings can help organizations prevent unauthorized access and reduce the risk of cyberattacks.
Only the people you invite via email will have access to your catalogs. The invited people will have to create a Catalogy account in order to read your catalogs. This option allows you to restrict access to your documents to a handful of people. Only the particular individuals that you decide to invite will be allowed to view your files and their identities will be verified through authentication.
Catalogy adheres to a formal vulnerability management process and applies patches based on a documented SLA. Also, we use golden images for critical security patches and updates, we make modifications on these golden images, test them and replace actual instances with new ones based on golden images.
a Mobile Device Management (MDM) solution to effectively manage and track company-owned devices. This implementation enhances data protection, enforces security policies, and provides real-time visibility into device activities, fortifying our commitment to safeguarding sensitive information. The MDM solution contributes significantly to a secure and resilient infrastructure, mitigating potential risks associated with mobile device usage within the organization.