Security at Catalant

The world’s leading companies trust Catalant with sensitive information on mission critical work that spans across thousands of employees, independent experts and firms, alumni and retirees, and previously approved firms and consultants.

Below are examples of Catalant’s commitment to information security—from our segregation and encryption practices to our posture on third-party suppliers—and the measures we take to keep our users’ data safe, earn our customers’ trust, and strengthen our relationships over time.

Personnel Security & Governance

Clear policies, procedures, and plans form the core of an effective security program. Catalant’s policies define the guidelines for employees to operate the Catalant Solutions Platform and Services, and serve to protect information assets. These policies include, but are not limited to, the following:

  • Identification, Authentication, and Access Control
  • Security Awareness
  • Acceptable Use
  • Risk Assessment
  • Audit and Accountability
  • Vulnerability Management
  • Change Management
  • Incident Response

Catalant’s management team reviews and approves policies annually—or when there is a significant change that impacts how controls or policies operate. Our information security team documents policies extensively and provides them to all employees on our intranet site.

As part of the Catalant employee onboarding process, all new hires must pass a background check, sign a confidentiality and non-disclosure agreement, complete security and privacy awareness training, and acknowledge receipt and understanding of our policies. We require all employees to complete security and privacy awareness training on an annual basis, and to re-certify that they agree to abide by our policies.

Systems & Data Access

Catalant tightly controls access to systems and data based on the principles of least privilege, strictly limiting access levels based on job responsibilities. We only permit a small number of experienced employees to administer our production system, and our documented approval process tracks employees that require production systems access.

Catalant provisions all employees with a unique identifier and password, and enforces two-factor authentication for all employees when they access any of our systems. Our information security team reviews permissions on a quarterly basis to help ensure that access remains appropriate to active and authorized personnel. When an employee departs from Catalant, our process dictates that we notify relevant system administrators, who immediately revoke access.

The Catalant Solutions Platform can integrate with customers’ various Single Sign-On (SSO) solutions via Security Assertion Markup Language (SAML), enabling streamlined management of customer personnel who access the platform. Alternatively, end users can enable two-step verification to access the Platform by navigating to the Account Settings page within their account.

Data Segregation

The Catalant Solutions Platform stores two categories of data: structured and unstructured. Structured data—including our expert profiles, customer profiles, and project information entered into the application—are stored within a Google Cloud SQL database. Unstructured data—including files uploaded by our customers or experts—are stored in Cloud Storage. We tag all customer data, and backend logical access controls prevent one customer from seeing the data of another customer.

Catalant restricts employee, customer and expert interaction with data via role-based access permissions that prevent users from accessing data without given permissions. Customers can further restrict access to the data they make available on the Platform using its access permission features.

Data Encryption

Today’s security landscape makes data encryption increasingly important. That’s why Catalant configures the load balancers to support secure Transport Layer Security (TLS) connections between end-point devices and the Catalant Solutions Platform to help ensure the secure transmission of information over public networks. We also encrypt all data stored on the Platform at rest, using advanced encryption standard (AES) 256-bit encryption.

System Changes

The Catalant product and engineering teams participate in the agile Software Development Life Cycle (SDLC) with multiple scrum teams. The Catalant SLDC includes a number of controls to help ensure development efforts are well-designed and secure. Controls in place include, but are not limited to, testing, code reviews, and management approvals prior to implementing a change into the production environment. Catalant also restricts the ability to implement changes in the production environment to a small number of authorized administrators.

Vulnerability Management

New security vulnerabilities that threaten the confidentiality, integrity, and availability of data arise constantly. We continuously monitor for security vulnerabilities to Catalant Solutions Platform components through methods including, but not limited to, subscriptions with our vendors and reputable researchers, as well as monthly vulnerability scanning of the Platform and underlying systems. We triage all vulnerabilities to determine impact and patch our systems according to criticality. The architecture of the Platform enables our engineering team to deploy security patches seamlessly without disrupting our customers’ experience.

Penetration Testing

Catalant engages an independent third party to annually perform penetration testing of our web applications and the underlying infrastructure to identify security vulnerabilities. Product and engineering management reviews all findings, prioritizes them, and tracks issues through to resolution. If required, we re-test vulnerabilities to ensure that remediation actions sufficiently addressed the finding, and to confirm that the vulnerability no longer exists.

Customers who wish to perform their own independent testing should contact their Catalant Account Executive. With advance notice, we can provision a test environment for customers to perform testing.

Business Continuity

Catalant leverages Google Cloud’s distributed architecture, spreading its data footprint over multiple regions, and multiple zones within those regions. Catalant uses a container-based architecture, which allows us to easily spin up the Catalant Solutions Platform infrastructure within another cloud provider, or from within our own hosted environment, if needed.

Catalant performs nightly backups by taking snapshots of all customer transaction data. Additionally, we retain binary logs to account for all data created and modified between nightly backups, allowing for a true point-in-time restoration, if needed. We also test the auto-failover ability of our database on a quarterly basis, and perform regularly scheduled data restoration tests to ensure the recoverability of data.

SOC 2 Evaluation

To help ensure that our controls are designed appropriately and operating effectively, Catalant undergoes an annual SOC 2 examination from an independent third-party audit firm. Please contact your Catalant Account Executive to request a copy of our most recent SOC 2 audit report.


At Catalant, our customers’ privacy is extremely important to us. Catalant has designed privacy program to meet General Data Protection Regulation (GDPR) requirements, as well as the rigorous demands of our customers and independent experts and firms in our Expert Marketplace. We are happy to sign data processing addendums and model clauses with our customers.

Google Cloud

The Catalant Solutions Platform is built on the Google Cloud Platform. As part of Google’s service offering, Google takes responsibility for physical and environmental security, availability, routing, switching and networking controls. Google data centers are equipped with state-of-the-art physical security controls including, but not limited to, multi-factor authentication (badge access card and biometric), strict role-based access, security guard monitoring, video surveillance systems, and access logging and monitoring. Google deploys environmental security controls within their data centers to ensure systems remain fully operational that include redundant generators, uninterruptible power supply (UPS) systems, cooling systems, and fire detection and suppression systems.

Google provides Catalant with additional built-in protections that include, but are not limited to:

  • Network layer intrusion detection: Google employs intelligent detection controls at data entry points with technologies in place to remedy certain dangerous situations.
  • Vulnerability management: Any Google software consumed by Catalant automatically updates to most current version.
  • Key management: Catalant’s encryption keys are stored in Google’s secure key management system (KMS) and rotated by Google on a quarterly basis.
  • Traffic load increase protection: Google’s Autoscaler adds the appropriate resources to handle traffic spikes when required.

By leveraging Google’s Cloud Platform, our product and engineering teams can focus their time on solving complex problems to meet the demands of our customers.

Third-Party Suppliers

At Catalant, we may use third parties to provide the Catalant Platform Solutions Platform and Services. We employ a third-party supplier evaluation process that requires all service providers follow the appropriate administrative, technical, and physical safeguards to ensure our security posture is maintained. This includes the review of any third-party audit reporting, penetration testing, vulnerability scanning results, and more. If required, our information security team will work directly with a third-party supplier’s security team to ensure compliance. Catalant also performs annual reviews of all third-party suppliers, to help ensure that their information security posture is up to our standards and aligns closely with our information security objectives.

As a trusted partner of more than 30% of the Fortune 100, Catalant holds safeguarding customer information as a top priority. As stewards of some of our customers’ most critical workstreams, we take our responsibility to maintain our enterprise-ready security posture seriously.

Should you have questions about any aspect of Catalant’s information security policies, processes, or plans, please contact your Catalant Account Executive.

Privacy Preference Center