SOC 2 Type 2 Certified
Antivirus Deployment
File integrity (host) and network intrusion detection (IDS) tools implemented
Internal and External Vulnerability scans
Personnel Training
Third Party Management
System Monitoring
System Design Documentation
Service Lifecycle:
Security Governance
Network Operations
Incident Response
PII Data Privacy
Identity & Access Management
Data Management
Change Management
Business Continuity
Back Up Management
Check our Bug Bounty Program Policy here.