Security
Last updated: March 18, 2025
We take the security of customer data very seriously. ThreatReaper SOC 2 Type II certification is in progress. If you have additional questions regarding security, we are happy to answer them. Please write to [email protected] and we will respond as quickly as we can. This Security Practices page describes the administrative, technical and physical controls applicable to ThreatReaper
Hosting and Architecture
ThreatReaper is available as an API and as a platform as as service. ThreatReaper uses a combination of infrastructure tools, all of which are SOC2 Compliant.
Confidentiality and Security Controls
ThreatReaper places strict controls over its employees’ access to Customer Data. The operation of the ThreatReaper requires that some employees have access to the systems which store or process this information and data. For example, in order to diagnose a problem the customer are having with the ThreatReaper services, we may need to access the customer’s account. These employees are prohibited from using these permissions to view Customer Data unless it is necessary to do so. We have technical controls and audit policies in place to ensure that any access to the customer account is logged. All of our employees are bound to our policies regarding confidentiality and we treat these issues as matters of the highest importance within our company.