The Security & Trust - Partner Self-Certified badge indicates that a Partner has completed Procore’s Partner Self-Certified security review process. Partners have supplied answers to a set of standard questions, self-certifying their adherence to certain specific security requirements.
The list of standard questions and each Partner’s answers can be found on the Partner’s Marketplace listing by clicking the badge and downloading the PDF. The Partner is solely responsible for the accuracy of the information they have provided through Procore’s review.
Procore’s Security review process does not constitute a detailed application-level security validation. This is a review of the partner’s company-level security practices.
Assessing application and vendor security is a shared responsibility. This badge is not intended to replace any vendor vetting led by a Procore customer. This is meant to provide Procore customers with supplemental information in addition to a customer’s own security evaluations. Customers should continue to do their own assessment before leveraging any technology or contracting with a specific vendor.
Assessing integration security is a shared responsibility between Partners, Procore, and our Customers. This responsibility is shared as follows:
Procore Technology Partners
Procore
Procore Customers
To learn more about an app before installing, we recommend customers:
Review the Partner-provided Security & Trust answers.
This includes information about:
Visit the partner’s website.
Some partners have their own Trust & Security centers on their website, which can provide detailed information about the company and specific integrated product.
Connect with the partner directly.
Partner contact information is provided on the Application listing and some partners may have dedicated security contact channels listed on their website.
Conduct a thorough vendor assessment
Prior to purchasing any new technology, customers should conduct a thorough vendor assessment to ensure the partner meets both business needs and the organization’s security requirements.