SOC 2 Compliance Security & 3rd-Party Integration Capabilities
Reconstruct and its partners are committed to keeping your data secure.
![Artboard 2_150 Artboard 2_150](https://reconstructinc.com/hs-fs/hubfs/Website%20Icons/Icons%20Blue/Artboard%202_150.png?width=61&height=60&name=Artboard%202_150.png)
Authentication
User authentication is performed over HTTPS. Passwords are salted and hashed and never stored in plain text format. Users may also enable multi-factor authentication and use SAML 2 based single sign-on through a linked Autodesk, Procore, or Oracle Aconex account.
![Artboard 2_196 Artboard 2_196](https://reconstructinc.com/hs-fs/hubfs/Website%20Icons/Icons%20Blue/Artboard%202_196.png?width=60&height=60&name=Artboard%202_196.png)
Encryption
Data is encrypted in flight via SSL/TLS with 2048-bit keys, and at rest with AES 256 encryption.
![Artboard 2_174 Artboard 2_174](https://reconstructinc.com/hs-fs/hubfs/Website%20Icons/Icons%20Blue/Artboard%202_174.png?width=61&height=60&name=Artboard%202_174.png)
Vulnerability Detection
Server traffic and logs are monitored for suspicious anomalies. Additionally, an independent third party runs automated vulnerability detection continuously to detect new risks.
![Artboard 2_199 Artboard 2_199](https://reconstructinc.com/hs-fs/hubfs/Website%20Icons/Icons%20Blue/Artboard%202_199.png?width=65&height=65&name=Artboard%202_199.png)
Antivirus & OS Security Patching
All servers are equipped with antivirus software, and operating systems are updated weekly.
![Artboard 2_17 Artboard 2_17](https://reconstructinc.com/hs-fs/hubfs/Website%20Icons/Icons%20Blue/Artboard%202_17.png?width=60&height=60&name=Artboard%202_17.png)
Change Control Management
All code changes are audited and approved before being merged. New releases are approved before deployment, and full changesets are logged.
![Artboard 2_163 Artboard 2_163](https://reconstructinc.com/hs-fs/hubfs/Website%20Icons/Icons%20Blue/Artboard%202_163.png?width=60&height=60&name=Artboard%202_163.png)
Penetration Testing
Reconstruct conducts annual penetration testing of our network and applications, both on web and mobile.
![Artboard 2_3 Artboard 2_3](https://reconstructinc.com/hs-fs/hubfs/Website%20Icons/Icons%20Blue/Artboard%202_3.png?width=61&height=60&name=Artboard%202_3.png)
Access and Activity Logging
User login events and other actions are tracked in our database. Server and network logs are also monitored and retained for 30 days before long-term archive.