Security is no joke.  We take serious measures to protect your information.

Application Security

You’ve trusted us with your personal information and we’ve built data security into our process to protect it. Our Secure Software Development Life Cycle (SSDLC) integrates a multi-disciplinary team to collaborate on security concerns throughout our entire product development cycle.

Network Security

Our Network Operations Center (NOC) utilizes state-of-the-art Security Information and Event Management (SIEM) to provide 24x7 network monitoring, intrusion prevention and detection alerting. Our sites deploy firewalls and traffic monitoring to ensure the security, stability, and reliability of our network and systems.

Endpoint Security

In addition to application and network security, all company devices are managed and secured. We centrally manage, fully encrypt, and utilize anti-virus and anti-malware protections on all workstations using VPNs (Virtual Private Networks) to connect offices and remote users.

Physical Security

Woop operates under a Clean Desk Policy ensuring that all sensitive or confidential information is securely locked away. Any visitors are escorted at all times by staff members. Cloud infrastructure providers are certified for SOC2 or ISO 27001:2013 compliance. All physical hosting locations provide multiple layers of security, including biometrics, physical guards, cameras, and secure equipment racks/cages.

Operational Governance

We require annual evaluation of all third-party vendors for data security and compliance, and we perform background checks on all staff members. Woop values SOC2, CCPA, and NYDFS compliance. Woop’s information security policies and processes are managed and monitored through our centralized Governance, Risk & Compliance (GRC) platform.

Security Details

Our Confidentiality & Security Team (CST) oversees Woop’s security program. The CST meets on a regular basis to ensure no incidents have occurred. Your information is managed and protected, and we take that seriously.

How to submit a vulnerability

To submit a vulnerability report or similar security violation to itsWoop Technologies LLC’s Product Security Team, please utilize the following email vulnerabilities [@]

If you'd like to anonymously report a vulnerability consider using a temporary email service like or