We Take Security Seriously.
TripleBlind treats data, network, and device security with the utmost importance. Using our privacy enhancing technology, we take a variety of steps to ensure the safety of all parties involved with TripleBlind.
TripleBlind treats data, network, and device security with the utmost importance. Using our privacy enhancing technology, we take a variety of steps to ensure the safety of all parties involved with TripleBlind.
TRAINING
In addition to providing all Tripleblind employees with yearly security training we take the following steps to ensure our clients can rest easy.
Software
TripleBlind uses three methods to ensure the security of the software that we write and deploy:
Container scanning to detect errors and vulnerabilities in the Docker containers we ship to our customers
Application
TripleBlind uses several methods to ensure the security of software applications:
Runtime Application Security Protection (RASP) to detect attacks on running software applications
Hardware
TripleBlind uses a fleet-management service to monitor TripleBlind hardware assets that have been issued to employees. This service allows us to:
Network
TripleBlind uses industry-standard security on Wifi endpoints in our offices.
When traveling, all employees use a TripleBlind-provided VPN.
Penetration
TripleBlind has an engagement underway with a third party security assessment firm. Among the goals of this assessment:
Alerting
TripleBlind staff receive alerts under the following conditions:
TripleBlind takes information security and compliance seriously. We achieved SOC 2 Type 1 certified by Laika and Laika Compliance LLC in April, 2022.
For inquiries into our report, please contact compliance@tripleblind.com.
TripleBlind is built on novel, patented breakthroughs in mathematics and cryptography, unlike other approaches built on top of open source technology. The technology keeps both data and algorithms in use private and fully computable.