Tricentis Virtual Summit is back for 2022

This fully online and free-to-attend conference is key to deliver innovation with confidence.

Register now
Your transformation toolkit

Advance your enterprise testing strategy with our transformation toolkit.

Learn more

Tricentis Security


Tricentis strives to implement and continuously execute a proactive strategy for security and compliance. As a leader in test automation for cloud and enterprise applications, we are dedicated to providing peace of mind to our customers by applying policies and procedures designed to keep our data, platform, and products secure. Although no security program is 100% immune to compromise, we utilize security controls that exceed the standards for the environments in which we operate.


Our security program is designed to mitigate risk using a combination of industry best practices and published standards:

SOC 2 Type 2

qTest conducts a SOC 2 Type 2 audit on an annual basis to test the design and operating effectiveness of the controls relevant to Security and Availability. A SOC 2 audit is performed to provide our customers with the assurance that we have the controls in place to protect their information and data through secure systems.

ISO/IEC 27001

Tricentis’ Information Security Management System (ISMS) is certified through the ISO 27001 standard annually, over a 3-year certification cycle. ISO 27001 tests against the requirements for the establishment, implementation, maintenance and continual improvement of the ISMS. An ISO 27001 audit is performed to demonstrate to our stakeholders that information security is taken seriously. In-scope products are Tricentis Tosca and LiveCompare.

Tricentis’ security program delivers against well-established pillars of trust.


Tricentis’ testing products are created to operate securely and efficiently while protecting against unauthorized access, unauthorized disclosure, or damage to systems that could affect other controls.


We ensure you can always access your data and that our systems maintain operational uptime and performance to meet your business objectives and service level agreements.


It is our top priority to protect your confidential information during collection, processing and disposal.


Tricentis R&D team practices static and dynamic code analysis, third-party assessments, peer reviews and formal change control.


We work diligently to ensure that all data is processed in a predictable manner, free of accidental or unexplained errors.


We only collect your Personally Identifiable Information (PII) with your consent and limit access of that information to previously identified, appropriate parties.

Responsible Disclosure

If you have discovered a vulnerability in a Tricentis application, please don’t share it publicly. Instead, please submit a report to us through a support ticket. We review all security concerns that are submitted and we strive to stay aware of the latest security developments by monitoring the threat landscape and by working with external security researchers and companies.

If you believe your account has been compromised or you are seeing suspicious activity on your account, please report it to your application administrator and