Security

At TrustPoint, security is key to fulfilling our customer commitment. We take security very seriously. Regular certifications, processes, and audits help us systematically ensure our products remain safe and secure for users.

SOC 2 Type II Certified

We are SOC 2 Type II certified across all five Trust Services Criteria (TSC), demonstrating our commitment to the highest security, confidentiality, and data integrity standards.

How we protect you

Our security program is built on industry best practices and continuous improvement.

  • Third-party library scanning
  • Least-privilege access controls
  • Network segmentation
  • Two-factor authentication
  • Spoofing protection
  • Encryption at rest and in transit
  • Data segregation
  • SSO and secure service authentication
  • Intrusion detection and prevention
  • Security awareness training
  • Penetration testing
  • Infrastructure as code
  • Peer-reviewed code
  • Near-real-time backup
  • Continuous vulnerability scanning

Our security commitments

Data Encryption

All data is encrypted at rest and in transit using industry-standard AES-256 and TLS 1.3 encryption.

Access Controls

Role-based access control with multi-factor authentication and detailed audit logging for all system access.

Continuous Monitoring

24/7 security monitoring with real-time threat detection and automated incident response protocols.

Compliance Audits

Regular third-party security audits and penetration testing to identify and address potential vulnerabilities.

Secure Infrastructure

Hosted on enterprise-grade cloud infrastructure with redundancy, disaster recovery, and high availability.

Security Training

All team members undergo regular security awareness training and follow strict security protocols.

Trust Services Criteria (TSC)

Our SOC 2 Type II certification covers all five Trust Services Criteria, ensuring comprehensive protection of your data.

1

Security

Protection against unauthorized access to systems and data.

2

Availability

Systems are available for operation and use as committed.

3

Processing Integrity

System processing is complete, valid, accurate, and timely.

4

Confidentiality

Information designated as confidential is protected.

5

Privacy

Personal information is collected, used, and retained properly.

Responsible disclosure and bug bounty

At TrustPoint, security is a top priority. We encourage responsible disclosure of any vulnerabilities through our bounty program. If you discover a security issue, please email us at security@trustpoint.ai with a detailed description of your findings. If the issue is deemed relevant, you may be eligible for compensation.

We appreciate your efforts in helping us maintain a secure platform. When reporting, please include steps to reproduce (if possible), the affected product or component, and the potential impact. We will acknowledge receipt and respond as quickly as we can.

Questions about security?

Our security team is available to answer questions about our security practices, compliance certifications, and enterprise security questionnaires.