Tricentis takes a proactive approach to security and uses technical, physical, and administrative security controls to prevent as much as possible, detect what cannot be prevented, and respond to events of interest appropriately. No security program is 100% immune to compromise, but we believe the security controls in place are appropriate for the environment in which we operate.
Highlights to our information security program include:
Tricentis Security Controls
Tricentis System and Organization Controls (SOC) Reports are independent third-party examination reports that show how Tricentis implements key compliance control objectives and helps you and your auditors understand the Tricentis security controls established to support secure operations and compliance.
If you have discovered a vulnerability in a Tricentis application, please don’t share it publicly. Instead, please submit a report to us through a support ticket. We review all security concerns that are submitted and we strive to stay aware of the latest security developments by monitoring the threat landscape and by working with external security researchers and companies.
If you believe your account has been compromised or you are seeing suspicious activity on your account, please report it to your application administrator and email@example.com.