Keeping our customers' data protected at all times is our highest priority
This page provides a high-level overview of Oscilar's security practices to protect our customers' data.

Keeping our customers' data protected at all times is our highest priority
This page provides a high-level overview of Oscilar's security practices to protect our customers' data.

Keeping our customers' data protected at all times is our highest priority
This page provides a high-level overview of Oscilar's security practices to protect our customers' data.

Compliant

SOC2 Type 2
The American Institute of Certified Public Accountants (AICPA) and Service Organization Controls (SOC) reports give assurance over control environments as they relate to the storage, retrieval, processing, and transfer of data. The SOC 2 reports is regularly refreshed and focuses on controls around security, availability, and confidentiality of customer data. Click here to request Oscilar's SOC 2 Type 2 report.
Request SOC2 Type 2 Certification

ISO 27001 Compliant
The International Organization for Standardization 27001 Standard (ISO 27001) provides a framework for Information Security Management Systems (ISMS) to support continued confidentiality, integrity, and availability of information. These certifications run for 3 years and have annual surveillance audits. Click here to request Oscilar’s ISO 27001 Certification.
Request ISO 27001 Certification
Request ISO 27001 Certification

SOC2 Type 2
The American Institute of Certified Public Accountants (AICPA) and Service Organization Controls (SOC) reports give assurance over control environments as they relate to the storage, retrieval, processing, and transfer of data. The SOC 2 reports is regularly refreshed and focuses on controls around security, availability, and confidentiality of customer data. Click here to request Oscilar's SOC 2 Type 2 report.
Request SOC2 Type 2 Certification

ISO 27001 Compliant
The International Organization for Standardization 27001 Standard (ISO 27001) provides a framework for Information Security Management Systems (ISMS) to support continued confidentiality, integrity, and availability of information. These certifications run for 3 years and have annual surveillance audits. Click here to request Oscilar’s ISO 27001 Certification.
Request ISO 27001 Certification

SOC2 Type 2
The American Institute of Certified Public Accountants (AICPA) and Service Organization Controls (SOC) reports give assurance over control environments as they relate to the storage, retrieval, processing, and transfer of data. The SOC 2 reports is regularly refreshed and focuses on controls around security, availability, and confidentiality of customer data. Click here to request Oscilar's SOC 2 Type 2 report.
Request SOC2 Type 2 Certification

ISO 27001 Compliant
The International Organization for Standardization 27001 Standard (ISO 27001) provides a framework for Information Security Management Systems (ISMS) to support continued confidentiality, integrity, and availability of information. These certifications run for 3 years and have annual surveillance audits. Click here to request Oscilar’s ISO 27001 Certification.
Request ISO 27001 Certification
Secure
Secure by design
We design our systems from the ground-up to be secure. Our engineering team has expertise with building secure systems at scale in an adversarial environment. In our system design process we follow a zero-trust security model and we add multiple layers of security controls. In the process of implementing our systems we are using an attacker mindset and we are exploring all the ways our systems can be attacked.
Secure by design
We design our systems from the ground-up to be secure. Our engineering team has expertise with building secure systems at scale in an adversarial environment. In our system design process we follow a zero-trust security model and we add multiple layers of security controls. In the process of implementing our systems we are using an attacker mindset and we are exploring all the ways our systems can be attacked.
Penetration tested
Oscilar employs a third party security firm to perform Security, Vulnerability, and Penetration testing for all our products. These are run at least annually and findings are remediated according to their criticality and prioritization. Oscilar’s penetration and security assessment test summaries can be requested here.
Penetration tested
Oscilar employs a third party security firm to perform Security, Vulnerability, and Penetration testing for all our products. These are run at least annually and findings are remediated according to their criticality and prioritization. Oscilar’s penetration and security assessment test summaries can be requested here.
Secure by design
We design our systems from the ground-up to be secure. Our engineering team has expertise with building secure systems at scale in an adversarial environment. In our system design process we follow a zero-trust security model and we add multiple layers of security controls. In the process of implementing our systems we are using an attacker mindset and we are exploring all the ways our systems can be attacked.
Penetration tested
Oscilar employs a third party security firm to perform Security, Vulnerability, and Penetration testing for all our products. These are run at least annually and findings are remediated according to their criticality and prioritization. Oscilar’s penetration and security assessment test summaries can be requested here.
Security pracrices
Security pracrices

Request a demo
risk management platforms at Apple, Uber and LinkedIn.