Security and privacy practices

Protecting your data with transparency and care.

Proshort helps teams come together, learn, celebrate and grow always with security in mind. You can trust Proshort to keep your data safe with enterprise-grade security features, compliance audits, privacy protections and all the capabilities of a fully on-demand, cloud environment.

We are fully SOC 2 Type 2, ISO 27001 and GDPR Compliance Certified.

Our most recent round of certification audits were completed as of April 2025.

Control in cloud

Proshort is hosted on the Google Cloud Platform, which has a proven track record for physical security and internal controls.

Control in cloud

Proshort is hosted on the Google Cloud Platform, which has a proven track record for physical security and internal controls.

Control in cloud

Proshort is hosted on the Google Cloud Platform, which has a proven track record for physical security and internal controls.

Encryption at rest

We use the Google managed encryption keys with 256-bit AES also called symmetric keys. These data keys are changed regularly and stored in a keystore using additional encryption.

Encryption at rest

We use the Google managed encryption keys with 256-bit AES also called symmetric keys. These data keys are changed regularly and stored in a keystore using additional encryption.

Encryption at rest

We use the Google managed encryption keys with 256-bit AES also called symmetric keys. These data keys are changed regularly and stored in a keystore using additional encryption.

Always up to date

Proshort requires no on-premises hardware or software to maintain and patch, (use of a client-side video recording assistant is optional). It is always up to date with the latest security patches.

Always up to date

Proshort requires no on-premises hardware or software to maintain and patch, (use of a client-side video recording assistant is optional). It is always up to date with the latest security patches.

Always up to date

Proshort requires no on-premises hardware or software to maintain and patch, (use of a client-side video recording assistant is optional). It is always up to date with the latest security patches.

Encryption in transit

Google's robust infrastructure is used for all network activity. It encrypts and authenticates all data in transit at one or more network layers when data moves outside physical boundaries not controlled by Google.

Encryption in transit

Google's robust infrastructure is used for all network activity. It encrypts and authenticates all data in transit at one or more network layers when data moves outside physical boundaries not controlled by Google.

Encryption in transit

Google's robust infrastructure is used for all network activity. It encrypts and authenticates all data in transit at one or more network layers when data moves outside physical boundaries not controlled by Google.

Ready to sharpen your sales execution?

Shorten deal cycles. Increase win rates. Elevate performance.

pink and white light fixture

Ready to sharpen your sales execution?

Shorten deal cycles. Increase win rates. Elevate performance.

pink and white light fixture

Ready to sharpen your sales execution?

Shorten deal cycles. Increase win rates. Elevate performance.

pink and white light fixture

Ready to sharpen your sales execution?

Shorten deal cycles. Increase win rates. Elevate performance.

pink and white light fixture