Software Secured Company Logo.
Services
Services
WEB, API & MOBILE SECURITY

Manual reviews expose logic flaws, chained exploits, and hidden vulnerabilities

Web Application Pentesting
Mobile Application Pentesting
Secure Code Review
Infrastructure & Cloud Security

Uncovers insecure networks, lateral movement, and segmentation gaps

External Network Pentesting
Internal Network Pentesting
Secure Cloud Review
AI, IoT & HARDWARE SECURITY

Specialized testing validates AI, IoT, and hardware security posture

AI Pentesting
IoT Pentesting
Hardware Pentesting
ADVANCED ADVERSARY SIMULATIONS

We simulate attackers, exposing systemic risks executives must address

Red Teaming
Social Engineering
Threat Modelling
PENETRATION TESTING AS A SERVICE

PTaaS provides continuous manual pentests, aligned with release cycles

Penetration Testing as a Service
OWASP TOP 10 TRAINING

Practical security training strengthens teams, shifting security left effectively

Secure Code Training
Ready to get started?
Identify real vulnerabilities confidently with zero-false-positive penetration testing
Learn More
Industries
Industries
INDUSTRIES
Data and AI

AI pentesting uncovers adversarial threats, ensuring compliance and investor trust

Healthcare

Penetration testing protects PHI, strengthens compliance, and prevents healthcare breaches

Finance

Manual pentests expose FinTech risks, securing APIs, cloud, and compliance

Security

Penetration testing validates SecurTech resilience, compliance, and customer trust

SaaS

Pentesting secures SaaS platforms, proving compliance and accelerating enterprise sales

CASE STUDY

“As custodians of digital assets, you should actually custodize assets, not outsource. Software Secured helped us prove that our custody technology truly delivers on that promise for our clients in both the cryptocurrency and traditional finance”

Nicolas Stalder,
CEO & Co-Founder, Cordial Systems
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Compliance
Compliance
COMPLIANCE
SOC 2 Penetration Testing

Pentesting validates SOC 2 controls, proving real security to auditors and customers

HIPAA Penetration Testing

Manual pentesting proves HIPAA controls protect PHI beyond documentation

ISO 27001 Penetration Testing

Pentests uncover risks audits miss, securing certification and enterprise trust

PCI DSS Penetration Testing

Pentesting validates PCI DSS controls, protecting sensitive cardholder data

GDPR Penetration Testing

GDPR-focused pentests reduce breach risk, regulatory fines, and reputational loss

CASE STUDY

“Software Secured’s comprehensive approach to penetration testing and mobile expertise led to finding more vulnerabilities than our previous vendors.”

Kevin Scully,
VP of Engineering, CompanyCam
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
PricingPortal
Resources
Resources
COMPLIANCE
Blogs
Case Studies
Events & Webinars
Partners
Customer Testimonials
News & Press
Whitepapers
API & Web Application Security Testing

The Highest Threat: The Hidden Weakness in Modern API & Web Application Security

Alexis Savard
November 21, 2025
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Login
Book a Consultation
Contact
Legal

Security & Compliance

Software Secured is actively working towards SOC 2, aligning people, process and technology to these security controls by the end of 2023. Current security policies and documentation are provided here.

Table of contents
Text Link
Text Link

1. People Security

  • All employees have security training, password manager, 20 security policies aligned to SOC 2.
  • Access to customer information is granted based on the least privilege principle, and limited sensitive data is processed. For more information, check out Software Secured’s privacy policy.
  • Secure access to the office.
  • Background checks are conducted on all employees.

2. Access and Identity

Permissions and authentication
Software Secured aligns policies, processes, and internal security controls to ensure that only those who need access to critical services have access to them. Software Secured has complex password requirements and leverage OAuth for customer authentication.

Access Tracking
Software Secured aligns to least privilege for access controls and conduct Annual Access Reviews.

3. Product Security

  • Customer data is physically separated, each customer has their own separate database.
  • Software Secured encrypts customer data at rest using rotating key schedule.
  • Software Secured uses RBAC to ensure important information is seen by the appropriate people.
  • Portal session timeout after 30 mins of idle, reducing risk of attackers hijacking the session as per OWASP recommendation.
  • All code is peer reviewed before pushed to development.
  • Software Secured encrypts all communication between applications and services in transit and at rest.
  • Software Secured has physical and logical separation of prod, staging, dev; each environment uses different servers.
  • Developers don't have access to production environments.
  • Software Secured uses a VPN for staging environment.
  • Databases are backed up offsite in an encrypted format.
  • Client data is maintained for 2 yrs unless otherwise requested.

4. Vulnerability Management

  • Software Secured runs static code analysis tools on code continuously + software composition analysis (checking for vulnerable libraries)
  • Software Secured conducts quarterly pentesting, and any potential vulnerabilities found are remediated within our vulnerability management SLAs and retested.
  • Regular security code reviews in place.
  • Anti virus protection is in place.
  • WAF in place.
  • Intrusion detection and firewall in place.
  • View our Portal Secure Engineering Policy.

5. Risk Management

  • Software Secured ensures vendors have appropriate security controls in place to handle customer and organization data, reviewing thorough security questionnaires and reports.
  • View Portal Terms and Conditions for Portal vendors.
  • Cloud security monitoring (IDS) is in place.
  • Incident response plan is simulated annually.
  • Risk management plan mapped to SOC 2 controls.
  • Software Secured conducts an annual business continuity plan in addition to a disaster recovery plan.
  • Responsible ethical disclosure policies in place and available on our website.
  • View Portal Privacy Policy.

6. Compliance

SOC 2 Compliance
Software Secured recently issued our SOC 2 Type 1 Report which provides an external audit that demonstrates we are meeting the security commitments we have made to our customers.

Last Updated: Nov 21, 2023

Helping companies identify, understand, and solve their security gaps so their teams can sleep better at night

Book a Consultation
Centralize pentest progress in one place
Canadian based, trusted globally
Actionable remediation support, not just findings
Web, API, Mobile Security
Web App PentestingMobile App PentestingSecure Code Review
Infrastructure & Cloud Security
External Network PentestingInternal Network PentestingSecure Cloud Review
AI, IoT & Hardware Security
AI PentestingIoT PentestingHardware Pentesting
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
More Services
Pentesting as a ServiceSecure Code Training
Industries
Data and AIFinanceHealthcareSecuritySaaS
Compliance
GDPR PentestingHIPAA PentestingISO 27001 PentestingPCI DSS PentestingSOC 2 Pentesting
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
Security & CompliancePrivacy PolicyTerms & Conditions
2025 ©SoftwareSecured