Trust Portal

Get access to this Trust Portal
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Overview

Welcome to Scytale's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.

Compliance

CSA STAR Logo
CSA STAR
GDPR Logo
GDPR
ISO 27001 Logo
ISO 27001
ISO 27017 Logo
ISO 27017
ISO 27018 Logo
ISO 27018
SOC 2 Logo
SOC 2
CCPA Logo
CCPA
HIPAA Logo
HIPAA
Get access to this Trust Portal
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Scytale is reviewed and trusted by

DeelDeel
Check Point Software TechnologiesCheck Point Software Technologies
CellebriteCellebrite
Lotto.comLotto.com
PayEmPayEm
Deep InstinctDeep Instinct
BioCatchBioCatch
ZestyZesty
TotangoTotango
Natural IntelligenceNatural Intelligence
Open iT,Open iT,
Orca AIOrca AI

Documents

Other Reports
SOC 2 Report
Data Processing Agreement
Acceptable Use Policy
Access Control Policy

Risk Profile

Data Access LevelInternal
Impact LevelModerate
Critical DependenceNo
See more

Product Security

Audit Logging
Data Security
Integrations
See more

Reports

Other Reports
Pentest Report
Security Whitepaper
See more

Data Security

Access Monitoring
Backups Enabled
Encryption-at-rest
See more

App Security

Credential Management
Secure Development Training
Software Development Lifecycle
See more

Data Privacy

Cookies
Data Privacy Officer
Privacy Whitepaper

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Infrastructure Security
See more

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Mobile Device Management
See more

Network Security

Firewall
IDS/IPS
Wireless Security

Corporate Security

Employee Training
Internal SSO
Penetration Testing

Policies

Acceptable Use Policy
Access Control Policy

If you need help using this Trust Center, please contact our Cybersecurity Risk team.

If you think you may have discovered a vulnerability, please send us a note.

Powered BySafeBase Logo