Data is more Powerful when Protected

See why millions of users trust us to enable secure experiences



Security is in our DNA

AvePoint understands the importance of security and operational risk management.

We are committed to your security and providing you with relevant metrics that help you make decisions that are proactive rather than reactive. While your automated detection technologies can help you build this program, it truly must be done in combination with policies, education and measurement, that organizations can appropriately balance collaboration and transparency with data protection and privacy.

We seek to earn your trust not only with robust security and privacy practices and policies, but with the way we operate and organize our business. Our Corporate Governance guidelines and code of conduct are available for anyone to review.

Should you have questions about our security programs, please feel free to contact us

Learn More


Your Privacy is our Priority

AvePoint is committed to the privacy and security of our customer and employee personal information.

AvePoint has a policy of transparency regarding our data collection, use, retention and sharing practices. It is our commitment to implement appropriate technical security measures to protect all AvePoint stakeholder and manage 3rd party risk.

AvePoint uses this foundation and discipline to develop market-leading privacy and security products and deliver world class customer service.

Our Privacy and Security Program dictates a governance structure whereby we:

  • Engage senior management on data privacy and security issues.

  • Align policies, procedures, and technical controls to demonstrate our process and our commitment to our customers and users.

  • Train each of our employees on all privacy and security expectations.

Should you have questions about our privacy programs, please feel free to contact us

Learn More


Web For All

AvePoint is committed to making this website as accessible as possible to persons with varying abilities or personal preferences.

Please note that although many documents and applications on this site are accessible to machine-reading devices, some legacy documents and applications are not. Our efforts to retrofit and/or upgrade non-accessible information are ongoing.

If you are experiencing difficulties accessing information or would like other information on or about this site, please contact us by emailing

Accessibility information for employment opportunities:

We value diverse experiences, backgrounds and perspectives among our employees, and see them as a competitive advantage. For additional information, please visit our AvePoint careers page.

We encourage you to request a reasonable accommodation if you are unable or limited in your ability to use or access the AvePoint careers site.

Accommodation requests can be made by emailing

Learn More

Our Company Processes, Services, and Software have obtained industry-leading Security, Privacy, and Accessibility certifications

CSA cloud security alliance
Microsoft 365 Compliance Badge
ISO 27001:2013 – Information Security
ISO 27017:2015 – Cloud Security
ISO 27701:2019 – Information Privacy

Industry Associations and Memberships

AvePoint participates with globally renowned associations and memberships to stay updated with current trends and proactively respond to security challenges.

Tech Accord
Secure Your Collaboration with AvePoint
AvePoint products and solutions ensure security, enable compliance, and prevent data loss

Secure Your Collaboration with AvePoint

Our products can be used to simplify security and compliance management for your organization and have helped organizations, including AvePoint, achieve compliance success! Our solutions, processes, and people follow industry standards and best practices for security and compliance. No matter your objective or priority, we can help.

Manage Information and Ensure Compliance

Assess and validate your systems to understand and inventory data and flows. Implement process and controls to support privacy and security by design to comply with GDPR and other regulations. Track progress over time to provide evidence of compliance.

Maximize Investment and Increase IT Agility

Manage and protect your information throughout its entire lifecycle to comply with retention, disposition, classification, and other policy guidelines. Easily monitor access controls, enable strong security, spending and best practices protocols all from one place.

Prevent Data Loss and Enable Business Continuity

Prevent data loss with robust information and platform security solutions. Back your data-centric audit and protection with our world-class backup software.

Security Notices and Alerts

  • LibWebP Notification:  View

  • Storm 0558 Vulnerability Notification: View

  • MOVEit Vulnerability Notification: View

  • Spring4Shell Vulnerability notification: View

  • Compliance Guardian Vulnerability 12172021: View

  • AvePoint/Java Zero-day Vulnerability Notification: View

  • Kaseya Vulnerability Notification: View

  • Compliance Guardian Vulnerability 07162021: View

  • AvePoint/Microsoft Exchange Server Notification: View

  • AvePoint/SolarWinds Notification:  View

  • AvePoint Security Notice 07172017:  View

  • AOS Platform Security Brochure:  View

Read our Security and Privacy Blogs

3 Questions

3 Questions Every Business Should Ask About Microsoft 365 Security

Dana S. - 04/15/2021

With privacy breaches and security threats making the nightly news around the world, it’s becoming increasingly obvious to most enterprise organizations that personal information and the sensitive data that companies hold is an extremely valuable currency.

Why Passwordless Authentication is the Future (and How to Get Started)

Adrian Valencia - 04/08/2021

Having a strong defense against data threats is of the utmost importance for any organization.

SharePoint Permissions: Best Practices for Modern Information Architecture

Joy T. Apple 02/08/2021

Permissions and security in SharePoint have always been a little tricky. This is in part because we find ourselves trying to make security fit into the organic patterns we as humans work in. But security tends to be more rigid.


Take the next step towards collaboration with confidence