RollSuiteRollSuiteFounded in 2014

RollSuite recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.

As a data platform for private equity multi-site rollups, we understand the importance in providing clear information about our security practices, tools, resources and responsibilities within RollSuite so that our customers can feel confident in choosing us as a trusted provider.

This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.

Security Overview

RollSuite is committed to maintaining the highest standards of security and privacy. Here's a summary of our trust posture.

4
Compliance Frameworks
29
Security Controls
12
Policies & Documents
7
Subprocessors

Data Encryption

All data is encrypted at rest using AES-256 and in transit using TLS 1.3. Customer data is logically isolated with strict tenant boundaries.

Access Management

Role-based access controls, multi-factor authentication, and regular access reviews ensure only authorized personnel access sensitive data.

Continuous Monitoring

24/7 monitoring, intrusion detection, and automated alerting ensure rapid identification and response to potential threats.

Infrastructure

Hosted on SOC 2 certified cloud providers with multi-region replication, automated backups, and disaster recovery procedures.