Start your security review View & download sensitive information Ask for information

Overview

Welcome to Trillo's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.

Compliance

EU-US DPF
EU-US DPF
GDPR
GDPR
HIPAA
HIPAA
SOC 2
SOC 2
Swiss-US DPF
Swiss-US DPF
SOC 3
SOC 3

Risk Profile

Data Access Level Restricted
Impact Level Low-impact
Recovery Time Objective 30 minutes

Product Security

Audit Logging
Data Security
Integrations

Reports

HIPAA Report
SOC 2 Report
SOC 3 Report

Data Security

Strict Data Backups
Data Security & Data Recover
Encryption-at-rest

App Security

Vulnerability & Patch Management
Code Analysis
Software Development Lifecycle

Legal

Privacy Policy
Terms of Service
Data Processing Agreement

Data Privacy

Cookies
Data Breach Protection
Employee Privacy Training

Access Control

Strict Data Access
Logging
System Encryption

Infrastructure

Status Monitoring
ISO/IEC 27001
Isolated Environments

Endpoint Security

Disk Encryption
DNS Filtering
Endpoint Detection & Response

Network Security

Firewall
Bot & Spoofing Protection
Traffic Filtering

Company Security

Asset Management Practices
Email Protection
Employee Training

Policies

Business Continuity/Disaster Recovery (BC/DR) Policy
Backup Policy
Data Security Policy
If you need help using this Trust Center, please contact us.
If you think you may have discovered a vulnerability, please send us a note.
Powered bySafeBase Logo

Risk Profile

Data Access Level

As a SaaS vendor selling to an enterprise customer, what type of data do you need access to?

Restricted (i.e. highly confidential information such as PII, personal identifiable information)
Impact Level

What is the potential impact to your enterprise customer if the data and/or functionality you, as the vendor, are supposed to manage, is compromised?

Low-Impact - Tolerable
Recovery Time Objective

What is your recovery time objective in case of critical failure? (e.g., your DB is deleted)

30 minutes
Recovery Point Objective

What is your recovery point objective in case of critical failure? (e.g., your DB is deleted)

60 minutes
Third Party Dependence

Are you also using other third-party services to manage or support your customers?

No
Critical Dependence

Will your product be a system that your enterprise customer critically depends on? (e.g., your system is mission critical)

Yes
Hosting

Are you hosted only on one of the major cloud providers or do you have any on-premise systems?

Major Cloud Provider & On-premise ISO:27001 Systems

Product Security

Audit Logging

Trillo maintains comprehensive audit logging across all support, web end-user applications, technical operations applications, and staging and production management infrastructure.

These logs capture essential information to monitor and analyze activities within our systems, ensuring transparency and security.

Data Security

Trillo is committed to ensuring the security of data across its platforms. We implement robust encryption methods for data in transit and at rest, safeguarding it against unauthorized access and breaches. Our data security measures also include regular security assessments, vulnerability management, and adherence to industry best practices.

Integrations

Trillo supports a wide range of integrations to enhance the functionality and interoperability of our platform and sercices. These integrations form part of the software we provide.

Each integration undergoes a thorough security review to ensure it meets our stringent security standards, providing seamless and secure connectivity with external services and tools.

Reports

HIPAA Report
SOC 2 Report
SOC 3 Report

Data Security

Strict Data Backups

Trillo maintains real-time backups, enabling immediate data recovery unless during a disaster. Daily backups are conducted, with full incremental backups every week. We utilize incremental backups to ensure data is always usable and readily available.

Data Security

Data transmitted between Trillo and its users is protected using mandated Transport Layer Security (TLS). If encrypted communication is interrupted, the Trillo application remains inaccessible to ensure data security.

Encryption-at-rest

All data at rest within Trillo's systems is encrypted using AES 256, providing robust protection against unauthorized access and ensuring data confidentiality.

App Security

Vulnerability & Patch Management

Trillo employs a robust patch management process to ensure that all software and systems are kept up-to-date with the latest security patches. We perform regular scans of our servers and networks to identify vulnerabilities, which are then tracked and remediated promptly according to our vulnerability management procedures.

Code Analysis

As part of our application security practices, Trillo conducts comprehensive code analysis, including peer reviews, static analysis, and dynamic analysis testing, before committing code to production. These measures help us identify and mitigate potential security vulnerabilities early in the development process.

Software Development Lifecycle

Trillo follows a software development lifecycle aligned with Agile principles, incorporating security at every stage.

Secure Development Training

All Trillo engineers and relevant personnel undergo secure development training commensurate with their roles and responsibilities. This training ensures that our team is equipped with the knowledge and skills necessary to build and maintain secure applications.

Legal

Terms of Service
https://trillo.cr/legal
Data Processing Agreement

Trillos's Data Processing Addendum is incorporated into the Terms of Service.

Data Privacy

Cookies

Trillo only uses essential cookies, and does not rely on cookies for marketing, analytics, or any other purposes.

Trillo DOES NOT sell or exchange any information to/with third parties.
Employee Privacy Training

Trillo ensures that all employees receive comprehensive privacy training to understand the importance of data protection and privacy regulations. This training covers key topics such as data handling best practices, privacy laws and regulations, and the responsibilities of employees in protecting sensitive information. Regular training sessions and updates ensure that our team stays informed about the latest privacy standards and practices.