As a provider of sensitive data discovery and remediation tools, PKWARE’s priority is to maintain a safe, secure, and compliant environment for hosted applications it provides to customers as well as providing secure development, professional, and support engineering services. To ensure the highest level of security and compliance, PKWARE is continually investing in our overall information security program, resources, and expertise.
We understand the importance in providing clear information about our security practices, tools, resources and responsibilities within PKWARE so that our customers can feel confident in choosing us as a trusted service provider.
Within this portal, we provide various information about our compliance controls, policies, practices, and evidence for your varying risk assessment and assurance activities. PKWARE is committed to transparent and open communication in order to provide you with the ability to make accurate decisions when it comes to your own data security.
Training
Training
We provide recurring security awareness training to all employees to ensure that they are aware of security best practices. This training includes regular phishing tests, rotating cyber security topics, and secure application development training including OWASP Top 10.
PK Protect Certified for Security, Confidentiality, and Availability
PK Protect Achieves SOC 2 Type I Certification
We are pleased to share that PKWARE has successfully achieved SOC 2 Type I certification for our PK Protect service—an important milestone in our ongoing commitment to enterprise-grade security and data protection.
This independent audit, conducted by a licensed CPA firm (Sensiba), evaluated our controls as they relate to the Security, Confidentiality, and Availability of customer data. The report verifies that, as of February 2025, our internal systems, processes, and safeguards are designed and implemented to meet the strict standards defined by the AICPA’s Trust Services Criteria.
What This Means for Our Customers
- Security: Systems are protected against unauthorized access and threats.
- Confidentiality: Sensitive data is handled and protected according to contractual and regulatory requirements.
- Availability: Systems are operationally resilient and available for use as committed.
We understand the importance of trust in B2B partnerships. Achieving SOC 2 Type I is a key part of our larger security roadmap, which includes our pursuit of SOC 2 Type II to demonstrate the ongoing effectiveness of these controls over time.
📄 A copy of this report is available on our Trust Center.
PKWARE is scheduled for a SOC 2 Type II Audit Observation Period from June 1, 2025 – August 30, 2025. A SOC 2 Type II report will be shared with our customers on our Trust Center shortly therafter.