Security
At TrustPoint, security is key to fulfilling our customer commitment. We take security very seriously. Regular certifications, processes, and audits help us systematically ensure our products remain safe and secure for users.
SOC 2 Type II Certified
We are SOC 2 Type II certified across all five Trust Services Criteria (TSC), demonstrating our commitment to the highest security, confidentiality, and data integrity standards.
How we protect you
Our security program is built on industry best practices and continuous improvement.
- Third-party library scanning
- Least-privilege access controls
- Network segmentation
- Two-factor authentication
- Spoofing protection
- Encryption at rest and in transit
- Data segregation
- SSO and secure service authentication
- Intrusion detection and prevention
- Security awareness training
- Penetration testing
- Infrastructure as code
- Peer-reviewed code
- Near-real-time backup
- Continuous vulnerability scanning
Our security commitments
Data Encryption
All data is encrypted at rest and in transit using industry-standard AES-256 and TLS 1.3 encryption.
Access Controls
Role-based access control with multi-factor authentication and detailed audit logging for all system access.
Continuous Monitoring
24/7 security monitoring with real-time threat detection and automated incident response protocols.
Compliance Audits
Regular third-party security audits and penetration testing to identify and address potential vulnerabilities.
Secure Infrastructure
Hosted on enterprise-grade cloud infrastructure with redundancy, disaster recovery, and high availability.
Security Training
All team members undergo regular security awareness training and follow strict security protocols.
Trust Services Criteria (TSC)
Our SOC 2 Type II certification covers all five Trust Services Criteria, ensuring comprehensive protection of your data.
Security
Protection against unauthorized access to systems and data.
Availability
Systems are available for operation and use as committed.
Processing Integrity
System processing is complete, valid, accurate, and timely.
Confidentiality
Information designated as confidential is protected.
Privacy
Personal information is collected, used, and retained properly.
Responsible disclosure and bug bounty
At TrustPoint, security is a top priority. We encourage responsible disclosure of any vulnerabilities through our bounty program. If you discover a security issue, please email us at security@trustpoint.ai with a detailed description of your findings. If the issue is deemed relevant, you may be eligible for compensation.
We appreciate your efforts in helping us maintain a secure platform. When reporting, please include steps to reproduce (if possible), the affected product or component, and the potential impact. We will acknowledge receipt and respond as quickly as we can.
Questions about security?
Our security team is available to answer questions about our security practices, compliance certifications, and enterprise security questionnaires.