Trust Portal

Start your security review
View & download sensitive information
Ask for information
Search items

Overview

Welcome to Scytale's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.

Compliance

CCPA Logo
CCPA
CSA STAR Logo
CSA STAR
GDPR Logo
GDPR
ISO 27001 Logo
ISO 27001
ISO 27017 Logo
ISO 27017
ISO 27018 Logo
ISO 27018
SOC 2 Logo
SOC 2
HIPAA Logo
HIPAA
Start your security review
View & download sensitive information
Ask for information

Scytale is reviewed and trusted by

Deel-company-logoDeel
Check Point Software Technologies-company-logoCheck Point Software Technologies
Cellebrite-company-logoCellebrite
Lotto.com-company-logoLotto.com
PayEm-company-logoPayEm
Deep Instinct-company-logoDeep Instinct
Makosi-company-logoMakosi
Zesty-company-logoZesty
Totango-company-logoTotango
Natural Intelligence-company-logoNatural Intelligence
Open iT,-company-logoOpen iT,
Cosmo Tech-company-logoCosmo Tech

Documents

SOC 2 Report
ISO 27001
Data Processing Agreement
Other Reports
Service-Level Agreement
Acceptable Use Policy
Access Control Policy
Backup Policy
Other Policies

Risk Profile

Data Access LevelInternal
Impact LevelModerate
Critical DependenceNo
View more

Product Security

Audit Logging
Data Security
Integrations
View more

Reports

Other Reports
Pentest Report
Security Whitepaper
View more

Data Security

Access Monitoring
Backups Enabled
Encryption-at-rest
View more

App Security

Credential Management
Runtime Application Self Protection
Secure Development Training
View more

Data Privacy

Cookies
Data Breach Notifications
Data Privacy Officer
View more

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Infrastructure Security
View more

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Mobile Device Management
View more

Network Security

Firewall
IDS/IPS
Wireless Security

Corporate Security

Asset Management Practices
Email Protection
Employee Training
View more

Policies

Acceptable Use Policy
Access Control Policy
Backup Policy
View more

If you need help using this Trust Center, please contact our Cybersecurity Risk team.

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo