Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items
ControlK

Overview

Welcome to the Cytracom Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this portal to learn about our security posture and request access to our security documentation.

Compliance

HIPAA Logo
HIPAA
SOC 2 Logo
SOC 2
Start your security review
View & download sensitive information
Ask for information

Documents

HIPAA Report
SOC 2 Report

Risk Profile

Data Access LevelInternal
Impact LevelModerate
Critical DependenceNo
View more

Product Security

Audit Logging
Data Security
Integrations
View more

Reports

HIPAA Report
SOC 2 Report

Data Security

Access Monitoring
Backups Enabled
Encryption-at-rest
View more

App Security

Code Analysis
Credential Management
View more

Data Privacy

Data Into System
Data Out of System
Data Privacy Officer

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Anti-DDoS
View more

Endpoint Security

Disk Encryption
DNS Filtering
Endpoint Detection & Response
View more

Network Security

Firewall
IDS/IPS
Security Information and Event Management
View more

Corporate Security

Email Protection
Employee Training
HR Security
View more

Policies

Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
View more

Security Grades

Qualys SSL Labs
ControlOne
A
UCaaS Console
A
Shield Test
A

Trust Center Updates

Cytracom News

GeneralCopy link

CYTRACOM Announces Industry-Leading Network Security for MSPs with ControlOne's New Passwordless Experience and Silent Deployment

With the latest release of ControlOne, CYTRACOM is removing the end user from the process of joining or connecting to corporate network infrastructures. "To achieve this objective, we are uniquely leveraging identity management, initially with Microsoft Azure AD and other third-party identity providers coming soon. With this update, the ControlOne agent can now be silently deployed by MSPs through RMM platforms. Unlike VPN software and other security solutions, no interaction with the end user is necessary during setup," says Eric Romano, Head of ControlOne Development, CYTRACOM.

Published at N/A

Security Update

GeneralCopy link

Cytracom ControlOne Combats 3CX Vulnerability

All ControlOne subscribers benefit from the proactive implementation of platform-wide restrictions associated with the published indicators of compromise associated with the 3CX Desktop App and malicious command-and-control (C2) communications. Additionally, Device Posture Assessment capabilities can be configured to isolate all hosts running the 3CX Desktop App from the rest of your network until the software has been removed or remediated.

Published at N/A
Powered bySafeBase Logo