Security & Compliance at Adeptia
Adeptia is committed to maintaining the highest standards of security and compliance. Explore our certifications, security policies, and authoritative documentation.
Certifications & Compliance
Independent third-party audits validate our security controls and compliance posture. Click on any document to request access.
SOC 2 Type 2
Independent CPA Firm
Independent audit of security controls based on AICPA Trust Services Principles and Criteria. Demonstrates operational effectiveness of controls over the audit period.
Security, Availability, Processing Integrity, Confidentiality, Privacy
ISO 27001:2022
IAF Accredited Certification Body
International standard for information security management systems (ISMS). Demonstrates comprehensive approach to managing sensitive company and customer information.
Information security management for B2B integration product development, technical support, and professional services
Vendor Assessments
Submit your security questionnaires, SIG assessments, CAIQ, or custom vendor assessments. Our security team will complete and return them promptly.
Security at a Glance
Key security controls and measures implemented across our platform.
Data Encryption
- Industry-standard encryption in transit
- Strong encryption at rest
- Secure VPN connections
- Full disk encryption
Access Control
- Single sign-on and MFA
- Least privilege principle
- Regular access reviews
- Automated account management
Backup & Recovery
- Defined recovery objectives
- Regular backup schedules
- Geographic redundancy
- Periodic recovery testing
Monitoring
- Continuous security monitoring
- Comprehensive audit logging
- Real-time alerting
- Regular vulnerability assessments
Personnel Security
- Background verification
- Security awareness training
- Ongoing education programs
- Clear desk policy
Incident Response
- Documented response process
- Incident prioritization
- Client notification procedures
- Post-incident review
Security Testing
Regular penetration testing by independent security firms validates our security posture.
External Network & Web Application Penetration Test
Independent Third-Party Security Firm
External network infrastructure and web applications
Comprehensive external penetration testing performed by an independent security firm. Testing included network reconnaissance, vulnerability assessment, and web application security testing.
Authoritative Security Documents
Our comprehensive security policies govern all aspects of information security management. Click on any policy to request access.
Cloud Services & Code Escrow
Documentation for our cloud hosting services and code escrow arrangements. Click on any document to request access.
Cloud Services
Code Escrow
Need More Information?
Contact our security team for additional documentation, NDA-protected materials, or to discuss your specific compliance requirements.
Document Requests
Request audit reports or policy documents under NDA
Vendor Assessment
Complete security questionnaires and assessments