Learn How Procore Protects Your Data in the Cloud Watch Now

Build securely on a platform trusted by 13,000+ companies.

See how the world’s most innovative builders and owners create more productive and safe jobsites with a global partner that is powered by a world-class infrastructure and data protection program.

Protect your organization and data at every layer.

See how Procore mitigates risk behind the scenes so you can feel confident with more control, visibility, and flexibility.

privacy folder icon

Stay Secure and Compliant

Safeguard your data, manage risk, and meet compliance standards—without compromising productivity.

Learn More
globe icon

Build On a Reliable Infrastructure

A reliable, secure, and performant cloud infrastructure supported by a technology partner you can trust wherever you build.

Learn More
lock and shield security icon

Defend Your Data

Data privacy practices designed to keep your data confidential and help you meet global privacy standards.

Learn More
Gilbane logo
PDG Corporation logo
Pomerleau logo
Rhomberg Sersa logo
Swinerton logo
Walsh logo

“Procore's firewall and security satisfied our most particular customers.”

Nicole Bulgarino


Read Their Story

“Procore’s cloud-based solution and security took all the worry out of our IT department.”

Terrance Degray

Associate Vice Chancellor, Physical Plant Development and Operations

San José Evergreen Community College District

Read Their Story

Named #1 in JBKnowledge’s 2021 ConTech Report

Schedule a personal walkthrough to see how putting our customer's security and data protection first made us the leading construction management platform.


Projects Built with Procore


Cloud Data File Storage Centers Worldwide


Dependable Availability

Request a Demo * Based on a 2022 survey of Procore customers.

Report a Security Vulnerability

If you believe Procore has a security vulnerability, please contact us right away. In your report, please include a description of the vulnerability and information to reproduce the vulnerability (including browser/OS versions, URLs, etc).

Contact Procore Security


Why use cloud-based software?

Relying on paper, computer hard drives, and siloed spreadsheets create challenges like 1) keeping software up to date, and 2) maintaining enough storage space, 3) troubleshooting and repair, 4) ensuring access to information, and 5) no single source of accurate data or real-time project visibility. Procore, as a cloud-based platform solution, addresses all of these challenges.

How does “the cloud” work?

When people think of the cloud, it sounds like a big void where information goes and you’re not quite sure what happens to it, who can see it, and how you can get to it again. With the cloud, information is stored at a secure data center managed by Amazon Web Services or another provider, depending on who the software provider has contracted with. There are digital and physical protections in place to restrict access to authorized users.

Does Procore provide file storage around the world?

Yes — Procore has 16 cloud data centers around the world, from Canada to Australia and from the U.K. to South Africa. This enables files, attachments, and documents to be stored in the desired location, in order to dramatically improve file performance (rendering, upload, and download).

How does Procore help manage who can see what information ?

That’s where role-based access controls (or RBAC for short) come into play. Procore, like other SaaS providers, works with customers to designate an administrator who has access to settings for each module and can assign permissions to people inside and outside the organization to view or contribute to the information. For example, let’s say a GC wants to use Procore to communicate with Owners and Specialty Contractors as they collaborate on a project. They want to be able to send and receive RFIs and Submittals, etc., but they don’t want anyone outside their organization to see their Budget. That module can be restricted to only a subset of users within the GC.

How do users access Procore’s software and get ongoing updates ?

After purchasing Procore, we provide information on setting up the account and configuring the system. For the web browser application, users automatically get access to the latest software version. There is no need to initiate an update or worry if the latest version is installed. The iOS/Android applications follow the standard app update model where users configure their devices to automatically update apps or prompt the user to accept an update.

How does Procore work with other software solutions?

The integration of other cloud-based software onto Procore’s platform take place using something called APIs, which stands for Application Programming Interface. An API provides a bridge between two or more software programs so that they can share information in one direction or two directions. In other words, it helps them talk to each other. You can explore a full list of over 300+ integrations in the Procore App Marketplace.

Why does an open platform enhance my security?

Procore understands that users sometimes need specialized functionality that may only be available through third party vendors. That’s why we designed the system with a set of tools that other vendors can use to connect to Procore. When you sign up for their services and provide them access, data can flow in a safe and secure one-way or two-way between Procore and the third party software.

What security standards does Procore adhere to?

Procore wants you to be comfortable with our security, as verified by third-party organizations. Therefore, we comply with major IT security management standards including (ISO) 27001:2013 as a framework for confidentiality, integrity and availability of information; and SSAE18 SOC 2 to maintain confidentiality.We also know that personal data stored in our systems comes with rights and responsibilities and we adhere to global data protection standards and principles including General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and Australian Privacy Principles.