All Systems Operational

Security & Compliance at Adeptia

Adeptia is committed to maintaining the highest standards of security and compliance. Explore our certifications, security policies, and authoritative documentation.

SOC 2
Type 2 Certified
ISO 27001
Certified
16
Security Policies

Certifications & Compliance

Independent third-party audits validate our security controls and compliance posture. Click on any document to request access.

SOC 2 Type 2

Independent CPA Firm

Active

Independent audit of security controls based on AICPA Trust Services Principles and Criteria. Demonstrates operational effectiveness of controls over the audit period.

Scope

Security, Availability, Processing Integrity, Confidentiality, Privacy

Available Documents

ISO 27001:2022

IAF Accredited Certification Body

Active

International standard for information security management systems (ISMS). Demonstrates comprehensive approach to managing sensitive company and customer information.

Scope

Information security management for B2B integration product development, technical support, and professional services

Available Documents

Vendor Assessments

Submit your security questionnaires, SIG assessments, CAIQ, or custom vendor assessments. Our security team will complete and return them promptly.

Security at a Glance

Key security controls and measures implemented across our platform.

Data Encryption

  • Industry-standard encryption in transit
  • Strong encryption at rest
  • Secure VPN connections
  • Full disk encryption

Access Control

  • Single sign-on and MFA
  • Least privilege principle
  • Regular access reviews
  • Automated account management

Backup & Recovery

  • Defined recovery objectives
  • Regular backup schedules
  • Geographic redundancy
  • Periodic recovery testing

Monitoring

  • Continuous security monitoring
  • Comprehensive audit logging
  • Real-time alerting
  • Regular vulnerability assessments

Personnel Security

  • Background verification
  • Security awareness training
  • Ongoing education programs
  • Clear desk policy

Incident Response

  • Documented response process
  • Incident prioritization
  • Client notification procedures
  • Post-incident review

Security Testing

Regular penetration testing by independent security firms validates our security posture.

External Network & Web Application Penetration Test

Independent Third-Party Security Firm

No Vulnerabilities Found
Zero critical, high, medium, or low findings identified
0
Critical
0
High
0
Medium
0
Low
Testing Scope

External network infrastructure and web applications

Comprehensive external penetration testing performed by an independent security firm. Testing included network reconnaissance, vulnerability assessment, and web application security testing.

Authoritative Security Documents

Our comprehensive security policies govern all aspects of information security management. Click on any policy to request access.

Showing 17 of 17 policies

Cloud Services & Code Escrow

Documentation for our cloud hosting services and code escrow arrangements. Click on any document to request access.

Cloud Services

Code Escrow

Need More Information?

Contact our security team for additional documentation, NDA-protected materials, or to discuss your specific compliance requirements.

Security Team

For security inquiries and incident reports

security@adeptia.com

Document Requests

Request audit reports or policy documents under NDA

Vendor Assessment

Complete security questionnaires and assessments