Keeping our customers' data protected at all times is our highest priority
Keeping our customers' data protected at all times is our highest priority
Keeping our customers' data protected at all times is our highest priority
Keeping our customers' data protected at all times is our highest priority
This page provides a high-level overview of Oscilar's security practices to protect our customers' data.
This page provides a high-level overview of Oscilar's security practices to protect our customers' data.
This page provides a high-level overview of Oscilar's security practices to protect our customers' data.
This page provides a high-level overview of Oscilar's security practices to protect our customers' data.
GDPR-Compliant
GDPR-Compliant
SOC2 Type 2
The American Institute of Certified Public Accountants (AICPA) and Service Organization Controls (SOC) reports give assurance over control environments as they relate to the storage, retrieval, processing, and transfer of data. The SOC 2 reports is regularly refreshed and focuses on controls around security, availability, and confidentiality of customer data. Click here to request Oscilar's SOC 2 Type 2 report.
Request SOC2 Type 2 Certification
Request Certification
ISO 27001 Compliant
The International Organization for Standardization 27001 Standard (ISO 27001) provides a framework for Information Security Management Systems (ISMS) to support continued confidentiality, integrity, and availability of information. These certifications run for 3 years and have annual surveillance audits. Click here to request Oscilar’s ISO 27001 Certification.
Request ISO 27001 Certification
Request Certification
Secure
Secure by design
Secure by design
We design our systems from the ground-up to be secure. Our engineering team has expertise with building secure systems at scale in an adversarial environment. In our system design process we follow a zero-trust security model and we add multiple layers of security controls. In the process of implementing our systems we are using an attacker mindset and we are exploring all the ways our systems can be attacked.
We design our systems from the ground-up to be secure. Our engineering team has expertise with building secure systems at scale in an adversarial environment. In our system design process we follow a zero-trust security model and we add multiple layers of security controls. In the process of implementing our systems we are using an attacker mindset and we are exploring all the ways our systems can be attacked.
Penetration tested
Penetration tested
Oscilar employs a third party security firm to perform Security, Vulnerability, and Penetration testing for all our products. These are run at least annually and findings are remediated according to their criticality and prioritization. Oscilar’s penetration and security assessment test summaries can be requested here.
Oscilar employs a third party security firm to perform Security, Vulnerability, and Penetration testing for all our products. These are run at least annually and findings are remediated according to their criticality and prioritization. Oscilar’s penetration and security assessment test summaries can be requested here.
Security pracrices
Request a demo
Request a demo
Request a demo
risk management platforms at Apple, Uber and LinkedIn.
Request a demo
risk management platforms at Apple, Uber and LinkedIn.
© 2024 Oscilar. All rights reserved.