Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Overview

Rootly has implemented best-in-class security practices to keep customer data safe and operates in the most regulated markets.

100+ global organizations from startups to F500 trust Rootly to be their incident management solution of choice.

Contact: security@rootly.com

Compliance

CCPA Logo
CCPA
GDPR Logo
GDPR
SOC 2 Logo
SOC 2
Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Documents

9 Documents
Network Diagram
Pentest Report
SOC 2 Report
Vulnerability Assessment Report
Cyber Insurance
Data Processing Agreement
Master Services Agreement
Business Continuity Policy

Product Security

Role-Based Access Control
Audit Logging
Data Security
See more

Reports

Network Diagram
Pentest Report
SOC 2 Report
See more

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

App Security

Bug Bounty
Code Analysis
Software Development Lifecycle
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Anti-DDoS
Amazon Web Services
BC/DR
See more

Endpoint Security

Disk Encryption
Endpoint Detection & Response
Mobile Device Management

Network Security

Data Loss Prevention
Security Information and Event Management
Zero Trust

Corporate Security

Email Protection
Employee Training
Incident Response
See more

Policies

Business Continuity Policy

Trust Center Updates

CVE-2022-21449

Published at 05/16/2022, 9:44 PM

None of our services are running Java 15, 17, and 18 so this vulnerability (CVE-2022-21449) is not exploitable on our side.

If you think you may have discovered a vulnerability, please send us a note.