Trust Center
Pingtree helps performance marketing teams collect, route, verify, and distribute lead data. This page summarizes the security, privacy, reliability, and compliance practices that support the platform.
SOC 2 status
Readiness planned. Audit not yet started.
99.5%
Monthly uptime target
TLS 1.2+
Encryption in transit
AWS KMS
Sensitive data encryption
SOC 2
Readiness planned
Current
Public SLA, security controls, data protection measures, and operational responsibilities are documented for customer review.
Next
Pingtree is preparing for SOC 2 readiness work, including control mapping, evidence collection, access reviews, change management, and vendor risk documentation.
Planned
After readiness work is complete, Pingtree intends to begin the formal audit path with an independent CPA firm.
Controls
Pingtree is designed for teams that move sensitive lead data between campaigns, buyers, CRMs, and verification partners. Controls focus on access, data handling, system availability, and operational traceability.
Platform stack
The backend is organized into dedicated services for API traffic, webhook delivery, billing, scheduled jobs, sockets, email, and payout workflows. This keeps critical lead routing paths separated from supporting operations.
Third parties
Pingtree depends on trusted infrastructure and service providers. Usage can vary by customer workflow and enabled integrations.
| Provider | Purpose |
|---|---|
| Amazon Web Services | Cloud hosting, network, storage, logging, and security services |
| MongoDB Atlas | Managed database hosting and backups |
| SendGrid | Transactional email delivery |
| Stripe | Billing and payment processing |
| VZEW / Array | Credit verification and lead enrichment where configured by customer workflows |
Customers can request security questionnaires, platform documentation, and SLA details through support.