Overview
Rootly has implemented best-in-class security practices to keep customer data safe and operates in the most regulated markets.
100+ global organizations from startups to F500 trust Rootly to be their incident management solution of choice.
Contact: security@rootly.com
Compliance
CCPA
GDPR
SOC 2
Documents
Network Diagram
Pentest Report
SOC 2 Report
Vulnerability Assessment Report
SOC 2
Cyber Insurance
Data Processing Agreement
Master Services Agreement
Business Continuity Policy
Product Security
Audit Logging
Data Security
Integrations
See more
Reports
Network Diagram
Pentest Report
SOC 2 Report
See more
Data Security
Access Monitoring
Backups Enabled
Data Erasure
See more
App Security
Code Analysis
Credential Management
Responsible Disclosure
See more
Legal
Cyber Insurance
Data Processing Agreement
Master Services Agreement
See more
Access Control
Data Access
Logging
Password Security
Infrastructure
Amazon Web Services
Anti-DDoS
BC/DR
See more
Endpoint Security
Disk Encryption
Endpoint Detection & Response
Mobile Device Management
Network Security
Data Loss Prevention
Security Information and Event Management
Zero Trust
Corporate Security
Email Protection
Employee Training
Incident Response
See more
Policies
Business Continuity Policy
Trust Center Updates
After careful review of our infrastructure and SBOM, the Rootly team has determined that we are not currently vulnerable to the OpenSSL 3 vulnerabilities CVE-2022-3602 and CVE-2022-3786 that were disclosed on November 1, 2022.
Published at N/A
None of our services are running Java 15, 17, and 18 so this vulnerability (CVE-2022-21449) is not exploitable on our side.
Published at N/A
If you think you may have discovered a vulnerability, please send us a note.