RELAYTO logo RELAYTO logo
Certifications, Sub-Processors & Pen Tests
Certifications, Sub-Processors & Pen Tests
(DPA defined | SOC 2 compliant) Sub-Processors
Architecture
SOC 2 Type 2 Certificate
Penetration Tests

Certifications, Sub-Processors & Pen Tests

0

(DPA defined | SOC 2 compliant) Sub-Processors

0

Architecture

0

SOC 2 Type 2 Certificate

RELAYTO AI SOC 2 Type 2 independent service auditor's report on controls relevant to security, confidentiality, and availability.
Selected ()

Penetration Tests

Settings Analytics

Collection of vulnerability assessment and penetration testing reports of RELAYTO infrastructure and API endpoints done by the independent third-party security firm.

0

RELAYTO Penetration Test Report

This document details the findings of a web application penetration test, highlighting the identification and remediation of a critical vulnerability and the organization's improved security posture.
0

RELAYTO Endpoints Penetration Test Report Summary

This report indicates that no issues were found during the security scan for Relayto's API and website, marking it as 'All clear' with no critical, high, medium, or low issues detected.
0

RELAYTO Endpoints Penetration Test Results

Page scroll ∙ 101 pages
Selected ()
Selected ()

Have an account?Log in
Have an account?Log in
AI Content Chat