Security at Soarsilk
Security is built into the fabric of our service, infrastructure, and processes, so you can
rest assured that your data is safeguarded.
Cloud Product Security
Security is built into the fabric of our cloud products. We employ numerous controls to
safeguard your data including encryption in transit and at rest across our cloud services.
While a young company, and currently short on certifications, we take security seriously and
are in the process of setting up SOC 2.
Security Operations and Best Practices
We approach security holistically with a common controls framework. Security threats are
prevented using secure software development practices, and industry-accepted operational
practices.
Platform and network security
We perform rigorous security testing including
threat-modeling, automated scanning, and third-party testing. If an incident occurs, we
resolve the issue quickly using our security incident response practices and keep you
informed with
real-time system status.
Availability and Continuity
We maintain high levels of availability with multiple geographically diverse data centers
and robust Disaster Recovery and Business Continuity programs.
Key Security Offerings
Here's a look at some of our most significant and highly-requested security features.
Data encryption in Transit
Data encryption at Rest
Enforced two-factor authentication (2FA)
Adherence to industry cloud security standards
Fast track your vendor security assessment
Transparency is key to our security philosophy. That's
why we partner with the Cloud Security Alliance (CSA) to make our Consensus Assessment
initiative Questionnaire (CAIQ) publicly available.
Report a Vulnerability
Soarsilk encourages customers and the security research community to report vulnerabilities
in our product to us. While we do not currently have a bug bounty program in place, we ask
that you reach out to us at security@soarsilkcom.