Robust Protections

Our Commitment to Security

We maintain the highest standards of security for all operational processes, ensuring our systems and your trust are well guarded.

Icon of a shield with a checkmark on the front

Infrastructure Security

Icon of checkmark
Production OS access restricted
QTalo restricts privileged access to the operating system to authorized users with a business need.
Icon of checkmark
Encryption key access restricted
QTalo restricts privileged access to encryption keys to authorized users with a business need.
Icon of checkmark
Remote access encrypted enforced
QTalo's production systems can only be remotely accessed by authorized employees via an approved encrypted connection.
Icon of checkmark
Production database access restricted
QTalo restricts privileged access to databases to authorized users with a business need.
Icon of checkmark
Production network access restricted
QTalo restricts privileged access to the operating system to authorized users with a business need.
Icon of checkmark
Network firewalls utilized
QTalo uses firewalls and configures them to prevent unauthorized access.
Icon of checkmark
Production network access restricted
QTalo restricts privileged access to the production network to authorized users with a business need.
Icon of checkmark
Firewall access restricted
QTalo restricts privileged access to the firewall to authorized users with a business need.

Organizational Security

Icon of checkmark
Anti-malware technology utilized
QTalo deploys anti-malware technology to environments commonly susceptible to malicious attacks and configures this to be updated routinely, logged, and installed on all relevant systems.
Icon of checkmark
Production inventory maintained
QTalo maintains a formal inventory of production system assets.

Product security

Icon of checkmark
Control self-assessments conducted
QTalo performs control self-assessments at least annually to gain assurance that controls are in place and operating effectively. Corrective actions are taken based on relevant findings. If the company has committed to an SLA for a finding, the corrective action is completed within that SLA.
Icon of checkmark
Data encryption utilized
QTalo's datastores housing sensitive customer data are encrypted at rest.
Icon of checkmark
Data transmission encrypted
QTalo uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted over public networks.

Internal security procedures

Icon of checkmark
Board oversight briefings conducted
QTalo's board of directors or a relevant subcommittee is briefed by senior management at least annually on the state of the company's cybersecurity and privacy risk. The board provides feedback and direction to management as needed.
Icon of checkmark
Board meetings conducted
QTalo's board of directors meets at least annually and maintains formal meeting minutes. The board includes directors that are independent of the company.
Icon of checkmark
Whistleblower policy established
QTalo has established a formalized whistleblower policy, and an anonymous communication channel is in place for users to report potential issues or fraud concerns.
Icon of checkmark
Cybersecurity insurance maintained
QTalo maintains cybersecurity insurance to mitigate the financial impact of business disruptions.
Icon of checkmark
Roles and responsibilities specified
Roles and responsibilities for the design, development, implementation, operation, maintenance, and monitoring of information security controls are formally assigned in job descriptions and/or the Roles and Responsibilities policy.
Icon of checkmark
Organization structure documented
QTalo maintains an organizational chart that describes the organizational structure and reporting lines.
Icon of checkmark
SOC 2 - System Description
Complete a description of your system for Section III of the audit report.