Best-in-class security

The Scholarly platform is trusted by some of the world’s leading higher ed institutions with their most sensitive data. We partner with industry-leading auditors and have best-in-class security posture.

Scholarly Trust Report
Scholarly Trust Report
Scholarly Trust Report

Scholarly Trust Report

View up-to-date security information, validated by an industry leading third party.

Scholarly is trusted by leading institutions

The Scholarly team comes from a background in developing payroll and HRIS software. We understand the importance of security when dealing with the most sensitive data for an institution.

With the ability to integrate various systems comes the responsibility to secure it using best practices. Scholarly partners with industry-leading external auditors to verify our security policies and controls annually. View up-to-date security information on the Scholarly Trust Report.

Encryption at Rest and In-Transit

All data, regardless of sensitivity, is encrypted at-rest and in-transit using the latest protocols supported by browsers and operating systems.

Audit Logging

All access for employees and customers is logged in the system with user and device telemetry. These logs are configured to never be destroyed or modified.

Multi-factor Authentication (MFA)

All production system accounts are secured with multi-factor authentication. We programmatically require MFA for all employees.

Timely Dependency Updates

All dependencies are kept up-to-date and are upgraded within 30 days of being released. CVEs will receive same-day upgrades.

Multiple Availability Zones (Multi-AZ)

Scholarly runs in multiple availability zones on its cloud providers to enable resiliency to natural disasters and intrusions.

Encryption at Rest and In-Transit

All data, regardless of sensitivity, is encrypted at-rest and in-transit using the latest protocols supported by browsers and operating systems.

Audit Logging

All access for employees and customers is logged in the system with user and device telemetry. These logs are configured to never be destroyed or modified.

Multi-factor Authentication (MFA)

All production system accounts are secured with multi-factor authentication. We programmatically require MFA for all employees.

Timely Dependency Updates

All dependencies are kept up-to-date and are upgraded within 30 days of being released. CVEs will receive same-day upgrades.

Multiple Availability Zones (Multi-AZ)

Scholarly runs in multiple availability zones on its cloud providers to enable resiliency to natural disasters and intrusions.

These are just a few of our security practices today, and we are always looking to improve. If you have questions or concerns about these security practices, please email security@scholarlysoftware.com.

Drive More Impact with Scholarly

Unlock the power of your data, automate your workflows, and improve the lives of your faculty.

© 2024 Scholarly Software, Inc. All rights reserved.

© 2024 Scholarly Software, Inc. All rights reserved.

© 2024 Scholarly Software, Inc. All rights reserved.