Articles & Resources on Security & Compliance | Wrike Blog
Please enter your email
Server error. We're really sorry. Wait a few minutes and try again.

Security & Compliance

Please enter your email
Server error. We're really sorry. Wait a few minutes and try again.
Scalability vs. elasticity: Understanding the difference
Project Management 10 min read

Scalability vs. elasticity: Understanding the difference

Clarify the differences between scalability and elasticity, two key concepts in technology and business growth.

Wrike Lock: The Key to Encryption Management
Wrike Tips 10 min read

Wrike Lock: The Key to Encryption Management

How does Wrike keep customer data safe? Developer Daniil Grankin dives into the concept of Encryption as a Service (EaaS) as well as the unique functionality of Wrike Lock.

Raising the Bar Again: 3 Wrike Security Enhancements  to Protect Your Work
News 5 min read

Raising the Bar Again: 3 Wrike Security Enhancements to Protect Your Work

With hybrid work environments now the norm, it makes sense to manage and collaborate on all your team’s projects in a centralized hub, like a work management platform. But as teams begin to store more of their work in the cloud, at some point, they begin to ask, “who has access, and is our data secure?” It’s a fair question, and teams deserve to know that their sensitive work is safe and secure from those without permission. Wrike is committed to keeping your data safe. Today, we’re announcing the availability of three enhancements to Wrike security features that reset the standard for work management platforms:  Space Level Delegation Locked Spaces Customizable User Types As a bonus, we’ve passed another series of security and privacy audits, including recertifications of SOC2 and SOC3. We first teased the security updates in our Collaborate 2021 announcement wrap-up article, and these features are aimed at giving more control to the right people while protecting your organization’s confidential data. The big three Wrike security features For context, here’s why security continues to be a driving force in our platform, according to Senior Vice President and Wrike General Manager, Citrix, Andrew Filev: “Enterprise-grade security and manageability have always played a central role in how we innovate and advance the Wrike platform. Overall increase in security risks, in addition to remote and hybrid work environments, has made data privacy a top priority for organizations. We want to ensure customers have a feeling of total security when they use Wrike, no matter where they sit in an organization. That’s why we continue to make Wrike Spaces, which are hubs for teams to house information and focus on purposeful work, and are robust yet still user-friendly. Our commitment to doing both of these things is where we are unrivaled.” Space-Level Delegation Space-Level Delegation enables teams to better democratize and organize their work by putting full rights into the hands of admins at the Space level. Now, Space admins can quickly and easily provide the right control to the right people on a task, project, or Space.  This new capability not only lets teams accelerate work by building out their own workspace based on their needs and timeline, but it also lets Space admins take full ownership by choosing who has access to what, such as reports, dashboards, or calendars, in real time. They can also access and manage Custom Fields, define member lists and permissions, and create and manage Space-level request forms.  Space-Level Delegation is available to Business, Enterprise, and Pinnacle customers. Locked Spaces Next is Locked Spaces, which are restricted, secure Spaces used to collaborate on isolated work and get things done with complete data privacy and control. Wrike is the only collaborative work management platform to offer the capability of Locked Spaces, which allows users to take extra precautions aimed at protecting their business and eliminating risks.  Unlike Public, Private, and Personal Spaces, only members of a Locked Space will be able to locate or access Space-level items or tools in Wrike and interact with other members in that Space. Whether your executive leadership team is collaborating on a sensitive project, finalizing contract details with legal, or you’re an agency working with a client, Locked Spaces ensures only approved stakeholders have access to the work items and information isn’t leaked accidentally.  L​ocked Spaces is available to Pinnacle customers. Customizable User Types One of Wrike’s cornerstone abilities is its customizability — request forms, workflows, dashboards, etc. Now, add user types to the list. With Customizable User Types, actions like disabling status changes from collaborators or allowing external users to share tasks and folders are as simple as one click. Customizable User Types extends current Access Roles and Controlled Admin Permissions security settings and builds on Wrike’s robust user and admin controls with a new way of managing granular permissions. It provides Account owners and admins with the correct permission to set up what users can do in Wrike based on their license and role type.  Customizable User Types are available to Enterprise and Pinnacle customers. This collection of security updates is best summed up by Filev: “Over the past few years, concerns around data security and confidentiality have grown exponentially as companies look for new ways to allow employees to work flexibly and collaboratively without compromising information integrity. We quell those fears with a work management platform that is not only the most powerful but the most secure, as well. With this latest round of security enhancements, we give teams and organizations the peace of mind they’re looking for.” Very few work management platforms offer as much configurability and security control as Wrike. We’re confident that these enhancements will safeguard customers’ sensitive work and reset the bar for data security. New compliance certifications To round out our security announcements, Wrike also passed another cycle of Security and Privacy audits and recertifications. These include five international security standards with the British Standards Institution and the extension of its SOC2 compliance and SOC3 reports, following an audit by Schellman & Company. For more information, visit our press release here. Trust your sensitive work data to Wrike Not all work requires the same permission levels. When your team requires more than the average, don’t settle for the status quo. Uplevel and upgrade your team’s work with Wrike security features. Start a free trial today and experience unparalleled data security from the most intuitive and robust collaborative work management solution.

Ways To Secure Your Company's Data/Processes With CWM Platforms
Collaboration 5 min read

Ways To Secure Your Company's Data/Processes With CWM Platforms

In an increasingly cloud-based work environment, collaborative work management systems with robust security capabilities are vital to protecting data. Businesses need to ensure productivity and collaboration for remote teams without compromising security.

The Ultimate List of Legal Resources for Startups
Leadership 5 min read

The Ultimate List of Legal Resources for Startups

Intellectual property rights, patent law, incorporation, equity distribution.... Navigating the legalities of starting a business can seem like an impossible feat, especially when one misstep could spell major trouble down the line. With an abundance of questions and limited resources, startups can’t afford to keep top legal minds on retainer for whenever an issue pops up. Time and money are vital to a fledgling company's success, so save both with this list of legal resources especially for entrepreneurs. Note: This list is a collection, not a ranking.  Articles & Advice Choose Your Business Structure How to Work with Lawyers at a Startup An Entrepreneur’s Guide to Wrangling and Hog-Tying a Lawyer Online Legal Services: Are They Effective for Startups? Venture Beat's Ask An Attorney 10 Questions Co-Founders Should Ask Each Other 5 Biggest Legal Mistakes Startups Make 3 Things Entrepreneurs Need to Know About Patent Law Reform 5 Ways Not to Respond to a Cease-and-Desist Letter 10 Big Legal Mistakes Made by Startups Blogs A View from the Valley by veteran startup lawyer Matt Bartus Counselor @ Law by speaker, writer, and public policy activist William Carleton Gust.com by a group of experienced startup founders and investors The High-touch Legal Services Blog for Startups by startup lawyer Dana Shultz Likelihood of Confusion on internet trademark and copyright infringement by lawyer Ron Coleman Mashtag Blawg by Bottom Line Law Group, a firm specializing in lean startups and business growth Startup Law 101 series of tutorials for founders and entrepreneurs Startup Law Blog by prominent startup and corporate transactions attorney Joe Wallin Technology & Marketing Law Blog, award-winning blog on internet law, intellectual property, and advertising law by law professor Eric Goldman Walker Corporate Law Blog by a boutique firm that specializes in representing entrepreneurs Websites Entrepreneur's Legal Basics for Startups, a collection of expert articles and videos from Entrepreneur magazine Startup Company Lawyer answers hundreds of specific questions, from incorporation to stock options Startup Lawyer has articles on topics like incorporation and equity, plus a helpful glossary of terms Quora Term Sheet is a collection of legal resources for entrepreneurs and investors hosted on Quora Upcounsel is a service that matches entrepreneurs to legal professionals based on their specific needs Small Business and the SEC is the official SEC guide to complying with federal securities laws while raising capital Rocket Lawyer has a collection of sample documents and a group of on-call attorneys to answer your legal questions Start-Up Launchpad holds educational materials, checklists, and sample legal documents Templates Docracy is an open collection of legal contracts. Document templates are free to download, customize, store, and e-sign, including a retainer agreement template for consulting services FormSwift Customize, sign, and download common business, legal, and personal forms, including a retainer proposal Series Seed Financing Documents Free, open-source legal documents for seed financing in MS Word (.DOC) format National Venture Capital Association's model legal documents A set of legal templates and terms GitHub repository Templates of Series Seed documents Y Combinator Financing Documents Sample forms for raising equity rounds with angel investors Orrick Term Sheet Creator Create drafts of startup and venture financing documents based on your responses to a series of interactive questions Orrick Start-Up Forms Library Key legal forms for starting and growing your company Wilson Sonsini Goodrich & Rosati Term Sheet Generator Generate a venture financing term sheet based on your responses to an online questionnaire Tools Founders Workbench Access useful tools such as: capital calculator, financing terms dictionary, service tax on professional fees consideration, intellectual property laws, and more Markify Searchable trademark database Viewabill View all billable activity by your lawyer: accruals, hours, and average rate Google Patent Search Use Google to search for existing patents US Patent & Trademark Office File a patent, register a trademark, and review intellectual property laws Finding a Lawyer LawKick Find a lawyer based on price, reviews, and qualifications LawTrades Get matched with a lawyer at your budget, plus free consultation, price quote, client reviews, and law office profiles LawGives Choose from a selection of flat-fee legal services packages FINRA BrokerCheck Research brokers, firms, investment adviser representatives and investment adviser firms ShouldISign.com Post a request and receive fixed-fee proposals from vetted attorneys, and check out their bank of free legal forms Checklists Start-Up Legal and Licensing To-Do List for Small Businesses Legal Checklist for Startups The Legal Checklist Every Startup Should Read What would you add to this list? Once you've set up your legal framework, find the tools you need to launch your business: 25 Tools to Run Your Startup.

Balance Transparency and Privacy for Optimal (and Secure) Collaboration
Collaboration 10 min read

Balance Transparency and Privacy for Optimal (and Secure) Collaboration

How do you strike the right balance between transparency and privacy? And how can Wrike help you get there? We break down the pros and cons of creating a more transparent organization.

The Human Factor in IT Security: How Apathetic Employees Can Leave Your Business Vulnerable
Leadership 7 min read

The Human Factor in IT Security: How Apathetic Employees Can Leave Your Business Vulnerable

Employee apathy is one of the biggest security liabilities of a company. So how can IT leaders increase employee engagement around security issues? Read more to learn why employee apathy about IT security happens and ways to improve employee engagement to prevent data loss or theft.

Wrike Announces New Data Center in Amsterdam to Support European Collaboration in the Cloud
News 3 min read

Wrike Announces New Data Center in Amsterdam to Support European Collaboration in the Cloud

We're excited to announce the launch of a new data center in Amsterdam to provide European businesses a new option for managing work in the cloud while operating in compliance with Europe’s regulations for privacy and security.

Announcing Wrike's Certification in the EU-US Privacy Shield Framework
News 3 min read

Announcing Wrike's Certification in the EU-US Privacy Shield Framework

Today we're pleased to announce that Wrike has been added to the list of companies that are certified under the new EU-U.S. Privacy Shield Framework. The Framework, which was announced on July 12, was crafted by the US Department of Commerce and the European Commission to allow companies in the US and Europe to comply with European data protection requirements when transferring personal data between the European Union and the United States.  To become Privacy Shield certified, US-based companies are required to meet criteria developed by the U.S. and EU, including a well-defined privacy policy as well as recourse and verification mechanisms. This gives users of technology a framework on which to ensure that vendors are operating in line with European regulators.  This certification reaffirms Wrike's commitment to transparency in the handling of our customer's personal data. Learn more about our investment in security and privacy, including 2-step verification, automatic backups, file encryption at rest, and other comprehensive security features and practices.  We are proud to be among the first companies in the world to adopt the EU-U.S. Privacy Shield Framework, and thank our customers in Europe and around the world for allowing Wrike to be a trusted partner in your team's collaboration while protecting your personal and business data.

Fast, Easy, and Secure Logins for Enterprise Users: SAML + Okta integration!
News 3 min read

Fast, Easy, and Secure Logins for Enterprise Users: SAML + Okta integration!

Wrike continues to build on its Enterprise functionality, keeping the product secure and scalable for large organizations. Many of you asked us about SAML-based Single Sign-On and Okta integration, and now we're rolling it out to create a fast, easy, and secure user login experience. Simplified Logins with SAML As a leading industry standard, SAML lets Enterprise users log in to Wrike (or any other cloud app) using their existing corporate credentials. New users will save time creating and activating their accounts, and have fewer passwords to remember. (Hooray for fewer post-it note reminders and "Please reset your password" emails!) With SAML, setting up an Enterprise account is a breeze no matter how big your team is, since it cuts the time you’d normally spend creating huge groups of new users. In addition, SAML further improves the security of your login credentials, since IT administrators can manage all employee info in a central corporate directory that can’t be accessed by any of the cloud services the company uses. Single Sign-On with Okta Integration In addition to rolling out this long-awaited Enterprise standard, Wrike also integrates with a popular SSO provider Okta. If your company uses Active Directory or LDAP to authenticate corporate users, add Okta integration to the mix, and benefit from Single Sign-On to Wrike and across all other web applications. Okta is an identity management service that integrates with corporate directories, as well as on-site, cloud-based and mobile apps. With Okta, you only have to enter your login information once and you’re signed on to all your work applications and tools, including Wrike.   If you don't have a corporate system, you can still benefit from the new smart Single Sign-On with the help of Okta. Just enter your credentials once to gain access to all your favorite cloud services without being prompted to log in at each of them. Ask our Support team to turn on the SAML Single Sign-On for your team, or add Wrike to your account in Okta.

Protect Your Account with 2-Step Verification
News 3 min read

Protect Your Account with 2-Step Verification

Today, we're adding 2-Step Verification (also known as two factor authentication) to Wrike. Enabling 2-Step Verification significantly strengthens the security of your account by requiring users to provide a security code after entering username and password. How 2-step verification works in Wrike: 2-Step Verification adds an extra criterion to protect your account. As Google's expert Matt Cutts explains, 2-Step Verification "requires 'something you know' such as password and 'something you have' such as mobile phone or another physical object." Wrike provides 2-Step Verification through the free Google Authenticator app which users will need to install on their mobile phones. When users log into Wrike, after entering their password they will be asked to enter special security code which is provided by the Google Authenticator app. To enable 2-Step Verification for your account, go to Account Settings/Security and you can make 2-Step Verification required for all users. Integration with Duo Security If you're using Duo Security, a leading provider of secure easy-to-use two-factor authentication technology, there's a good news for you too. You can customize security options on all employees' devices via Duo Security. To enable Duo Security for your account, contact our Support team. Adjust password strength On top of these updates we've also released a feature to ensure your users have strong passwords. All users will see a password strength meter when creating or changing their password and will be prompted to create a stronger one if the password they're using is weak. 2-Step Verification and integration with Duo Security are available to all Enterprise users. Collaborate on your projects in a secure environment with Wrike.

New User Audit Reports for Wrike Enterprise
News 3 min read

New User Audit Reports for Wrike Enterprise

We have launched the User Audit Reports, which give you powerful insights into user behavior, security compliance, internal and external threats, and user/group operational activities so that you can take corrective action to protect your data and streamline operations.

File Encryption at Rest: Your Attachments Made Even More Secure
News 3 min read

File Encryption at Rest: Your Attachments Made Even More Secure

Keeping your data safe in the cloud has always been a top priority for us. This is how we maintain the integrity and confidentiality of your data:  Wrike backs up your data nearly every second with real-time database replication. We store your data on our own servers, hosted in world-class data centers with SSAE16 Type 2 certification. We protect our servers using robust firewalls, equipped with instant alert mechanisms. We use industry-standard protocols with powerful symmetric ciphers to ensure secure communications over the Internet. But we’re always on the lookout for the best measures to keep your sensitive information safe. Which is why we’re adding an extra layer of protection by encrypting your files and attachments at rest. Files at rest are those uploaded attachments that are stored on Wrike's servers but not currently being accessed, shared, or modified. Advanced encryption safeguards all the information loaded into Wrike. Every attachment is encrypted with a 256-bit unique, cryptographically secure, and randomly-generated key for all accounts -- from Freemium to Enterprise. As always, we take every precaution to make sure your files are protected so you can breathe easy. If you have any questions about Wrike’s security measures, contact our Support team. A few words from our legal friends: The information here is provided “AS IS” without any warranty, express, implied or otherwise, regarding such information’s accuracy or performance. Any practices or policies described herein are subject to change without notice.

Remote Work Security Survey Results: Is Remote Work Really Secure?
Remote Working 7 min read

Remote Work Security Survey Results: Is Remote Work Really Secure?

Wrike conducted an online survey with 1,000+ respondents employed full-time by organizations in the U.S. Read our findings to see whether employees are taking cybersecurity seriously and why or why not.

All Team Members Can Now Invite New Users
News 3 min read

All Team Members Can Now Invite New Users

We always try to make your collaboration within team, across departments and with partners even quicker, smoother, and more efficient. Based on feedback from many of you, we added a great new feature that allows any user to immediately add new members to your Wrike account in an easy and secure way. These new user privileges will make it much easier to involve new people and let them get started with Wrike right away. Send Invites Without Interrupting Your Work Let's say you're working on an important project and you want to share it with your client, but your account admin went on vacation for a week. No worries. With this new feature, you can invite the client immediately instead of interrupting your admin's beach time to ask them to add the new user. And there is no longer a need to travel all the way to the administrative account management profile. We've introduced three new avenues so that, as an admin or a team member, you can invite people right when you think about it. ...From "Share Folder" in the folder list Right-click on a folder in your list and select "Share folder," just as you would to share it with a user already in Wrike. You will see a field allowing you to invite new users right away. To ensure your data stays safe, you can select the role for your invitee: regular user, external user, or collaborator (the two latter won't be able to share information with anybody else). People will have access to your folder as soon as they accept the invitation through their email account. ...From "Add assignee" or "Share with" in a task When you want to assign or share a specific task with someone not in the account yet you can invite their email address into Wrike directly from the "Add assignee" or "Share with" buttons. The task will automatically be shared with them once they accept the invite. For these two options, the new account's role is automatically assigned: If the invitee's email domain matches the corporate choice, they will be a regular user. If their email domain is different, they will be an external user. These new methods save you time and ensure that you never forget to add important people to your conversations. And by the way, if you're an account admin you can still use the previous methods for adding users, too. Your Data Stays Secure We're serious about the security of your data. Our elegant solution makes sure the right people get the right information. Make your employees regular users to give them all information they need to be productive. And when you invite an outside partner or client, they can be an external user with limited access: they can't invite new users, and they will only see the folders, files, and user information you explicitly share with them. Whenever someone is invited to join Wrike, the account admin will receive an email about the addition. If you have projects with elevated security requirements, you can modify your Account settings to restrict invitations. Enterprise admins will also be able to limit the role of new invitees to 'Collaborator' in the Security tab of their account settings. This collaboration enhancer will be rolled out to our existing customers on May 26, and new users can take advantage of the update right away. If you have any questions about the new feature, please feel free to contact our Support team.

How to Bake Data Handling Best Practices Into Your Project Workflows
Collaboration 7 min read

How to Bake Data Handling Best Practices Into Your Project Workflows

Want to know the secret ingredients to highly successful projects? Learn how to bake the data handling best practices into your workflows.

What You Need to Know About Governance, Risk & Compliance
Project Management 10 min read

What You Need to Know About Governance, Risk & Compliance

Governance, risk, and compliance (GRC) is how you ensure your business is healthy and above board. Dig into the details of GRC management in our guide.

What Marketers Need to Know About GDPR
Marketing 7 min read

What Marketers Need to Know About GDPR

Although GDPR is a company-wide initiative, tightening restrictions surrounding the capturing and storage of personal data have especially significant effects on marketing teams.

What Wrike Is Doing to Comply With GDPR and Protect Your Data
News 5 min read

What Wrike Is Doing to Comply With GDPR and Protect Your Data

Wrike takes cyber security and data protection very seriously. We’re currently taking steps to ensure we maintain secure and compliant systems for our European customers under GDPR.

Wrike Awarded CSA STAR Level 2 and ISO 27018 Certification
News 5 min read

Wrike Awarded CSA STAR Level 2 and ISO 27018 Certification

Leaders often overlook an important key feature when searching for the right work management software: security. Here at Wrike, we believe in developing a secure environment, and we're pleased to announce that we successfully passed the CSA STAR Level 2 Certification.

7 Tips for Avoiding Remote Work Security Risks
Remote Working 5 min read

7 Tips for Avoiding Remote Work Security Risks

The increase in remote work as a result of COVID-19 has presented its own set of secruity challenges. Learn more on identifying and mitigating these risks.

Wrike Announces New Security Upgrades
News 3 min read

Wrike Announces New Security Upgrades

We're excited to announce the addition of 3 new features to our Enterprise subscription package that enhance the security of project-related information, files, and interactions within Wrike.

Security: The New Competitive Advantage for Professional Services Teams
Collaboration 7 min read

Security: The New Competitive Advantage for Professional Services Teams

Data breaches are on the rise. Is your professional services team ready? Here's how a work management platform helps keep collaborations secure.

Your Collaborative Work Management Security Checklist
Collaboration 7 min read

Your Collaborative Work Management Security Checklist

Data security is a concern for teams because it stifles collaboration with customers. Get a secure work management platform with this checklist.