Security and Compliance
Detectify is committed to maintaining the highest standards of security and compliance. As a security company, we hold ourselves to the same rigorous standards we help our customers achieve.
Certifications and Standards
| Certification | Status |
|---|---|
| ISO 27001 | Certified |
| SOC 2 Type II | Compliant |
| GDPR | Compliant |
Trust Center
For the most up-to-date information about Detectify’s security posture, certifications, and compliance documentation, visit the Detectify Trust Center:
The Trust Center provides:
- Current certification status and audit reports
- Security practices and policies
- Sub-processor lists
- Data processing agreements
- Penetration test summaries
Our Commitment
Security Practices
Detectify follows security best practices across our operations:
- Encryption in transit — All data is encrypted using TLS 1.2 or higher
- Encryption at rest — All stored data is encrypted at rest
- Access controls — Role-based access with the principle of least privilege
- Regular audits — Third-party security audits and penetration testing
- Incident response — Documented incident response procedures with defined SLAs
Infrastructure
Detectify’s infrastructure is hosted on Amazon Web Services (AWS) in EU data centers. AWS provides the physical security, network infrastructure, and environmental controls that underpin our platform.
Learn More
- Compliance — Detailed information about certifications and compliance frameworks
- Data Privacy — How we handle and protect your data
Last updated on