Skip to Content
Security & ComplianceOverview

Security and Compliance

Detectify is committed to maintaining the highest standards of security and compliance. As a security company, we hold ourselves to the same rigorous standards we help our customers achieve.

Certifications and Standards

CertificationStatus
ISO 27001Certified
SOC 2 Type IICompliant
GDPRCompliant

Trust Center

For the most up-to-date information about Detectify’s security posture, certifications, and compliance documentation, visit the Detectify Trust Center:

trust.detectify.com 

The Trust Center provides:

  • Current certification status and audit reports
  • Security practices and policies
  • Sub-processor lists
  • Data processing agreements
  • Penetration test summaries

Our Commitment

Security Practices

Detectify follows security best practices across our operations:

  • Encryption in transit — All data is encrypted using TLS 1.2 or higher
  • Encryption at rest — All stored data is encrypted at rest
  • Access controls — Role-based access with the principle of least privilege
  • Regular audits — Third-party security audits and penetration testing
  • Incident response — Documented incident response procedures with defined SLAs

Infrastructure

Detectify’s infrastructure is hosted on Amazon Web Services (AWS) in EU data centers. AWS provides the physical security, network infrastructure, and environmental controls that underpin our platform.

Learn More

  • Compliance — Detailed information about certifications and compliance frameworks
  • Data Privacy — How we handle and protect your data
Last updated on