<aside> ⚠️ This guide outlines frequently asked questions from security teams. Please note that this page is for informational purposes only. Although we do our best to keep this information up-to-date, you should always refer to our Terms, Privacy Policy, or your signed agreements with Ashby for the most accurate information. Please reach out to [email protected] if you have questions not addressed in this page.

</aside>

Overview

This guide helps IT and security teams understand how Ashby integrates with your systems and what access it requires, to enable evaluating tradeoffs. It includes:

Use this guide to make informed decisions that balance integration benefits with your organization’s risk posture.

Section 1: About Ashby

What does Ashby do?

Ashby is an all-in-one recruiting platform that replaces several software classes your Talent team may use. As a result, Ashby’s integration with IT systems requires access similar to the software it replaces. Below is a summary:

Software Class Comparable Software Data Access
ATS Greenhouse, Lever HRIS Read/Write (e.g., Workday)
Sourcing/CRM Gem, SourceWhale, Interseller Email Read/Send
Scheduling Calendly, GoodTime, Modernloop Calendar Read/Write

Ashby requests the minimum access necessary to provide full functionality. While you can limit access, it may impact the Talent team’s experience. This document aims to help you assess your options and their tradeoffs to make an accurate risk assessment of Ashby.

Security, Privacy, and Reliability at Ashby

The integrations we request give Ashby access to data sensitive to your company, and we take this responsibility seriously. Here are the measures we take: