Home · Why iSECTECH · Our trust center
Our trust center.
Our own controls, policies, and disclosure posture.
Trust center
The same standards we hold you to, we hold ourselves to.
We publish our own security posture because we expect our clients to ask. Below is a summary — a detailed security questionnaire response and SOC 2 status are available on request under NDA.
Operational controls
- Single sign-on + MFA enforced across all corporate systems
- Least-privilege access reviews every quarter
- Endpoint protection + DNS filtering on every company device
- Encrypted backups with tested restoration
- Vulnerability management with defined SLAs
- 24/7 security monitoring
Data handling
- Customer data stored only as needed; retention tied to engagement lifecycle
- Regional data handling available on request
- Subprocessor list available on request
Active incident? Talk to an iSECTECH responder now.
If you suspect a breach, ransomware, or active intruder — call the 24/7 hotline. Triage immediately, on-bridge within 60 minutes, under NDA.
+1 800 325-187424/7 · 365 · NDA-ready
Next step
Let's scope your engagement.
Start with a focused 20-minute consultation. We will help you pick the right first move.
