Documents
Featured Documents
Hello,
With trust at the center of everything we do, we're enhancing and evolving the G2 platform every day to ensure we maintain a secure environment.
In order to continue to improve our platform, we have moved our subprocessor list to the G2 Trust Center. We recommend anyone that wants to receive updates to this list to subscribe on the new Trust Center page. If you were subscribed to our previous page, you will need to re-subscribe to the new page at trust.g2.com.
As part of G2 moving to our new Trust Center, we are updating our subprocessor list. As new vendors (sub-processors) may process your organization’s “personal data” [as defined under the European Union’s General Data Protection Regulation (GDPR)] in connection with the services and products that G2 provides, this shall serve as notification that we have added the following vendors as sub-processors:
NeverBounce: G2 Marketplace - Email Marketing Software
Salesforce: G2 Platform - Customer Relationship Management
Tango Card: G2 Marketplace - Gift Card Rewards and Services
Google Cloud: Infrastructure - Cloud Service Provider
Looker: G2 Platform - Business Intelligence
Slack: G2 Platform - Team Communication
Snowflake: G2 Platform - Data Warehouse
Prior to engaging any subprocessors, G2 evaluates privacy, security, and confidentiality practices, and enters into agreements to meet its obligations under applicable data privacy laws. If you have any questions, please reach out to privacy@g2.com.
Thank you for being a G2 customer!
G2 Privacy
After careful review of our infrastructure and SBOM, the G2 InfoSec Team has determined that we are not currently vulnerable to the MOVEit SQL Injection Vulnerability CVE-2023-34362 that was disclosed on 2023-06-02.
As a helpful resource, you can use this page to determine if certain widely used software in your environment is affected or unaffected: https://github.com/NCSC-NL/Progress-MoveIT-CVE-2023/blob/main/README.md
If you need help using this Trust Center, please contact us.
If you think you may have discovered a vulnerability, please send us a note.