Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items
ControlK

Overview

Welcome to Deep Sea Tech Inc.'s trust center website. At Doctor Droid (Deep Sea Tech Inc), we are fully committed to maintaining the highest standards of security and controls to protect our clients' data and information.

As a leading innovator in AIOps and automation technologies, we understand the importance of security and privacy in our industry. That's why we have implemented a comprehensive security program that includes policies, procedures, and controls to safeguard against unauthorized access, use, disclosure, and loss of data.

We continuously monitor our systems and infrastructure to identify and mitigate potential risks and vulnerabilities, and we regularly test and update our security controls to ensure they meet industry standards and best practices.

Our commitment to security extends beyond technology to our people and processes. We provide ongoing training and education to our employees to ensure they understand their role in maintaining the security of our operations and protecting our clients' data. We also have strict access controls and background checks in place to prevent unauthorized access to our systems and information.

On this trust center website, you'll find information about our security program, including our policies and controls, as well as updates on our ongoing efforts to strengthen our security posture. We are committed to transparency and welcome any questions or feedback you may have regarding our security practices. Thank you for trusting Deep Sea Tech Inc. as your partner in AIOps and automation.

Compliance

ISO 27001 Logo
ISO 27001
PCI DSS Logo
PCI DSS
SOC 2 Logo
SOC 2
Start your security review
View & download sensitive information
Ask for information

Dr. Droid is reviewed and trusted by

BharatPe-company-logoBharatPe
Credgenics-company-logoCredgenics
Shadowfax-company-logoShadowfax
magicpin-company-logomagicpin
Zolve-company-logoZolve
Uni Cards-company-logoUni Cards
Freight Tiger-company-logoFreight Tiger
Prodigal-company-logoProdigal
BuyStars-company-logoBuyStars
Wishlink-company-logoWishlink
Kutumb-company-logoKutumb
Fini-company-logoFini
Spenmo-company-logoSpenmo
Bureau-company-logoBureau
Jify - Advance Salary App-company-logoJify - Advance Salary App
Stratzy-company-logoStratzy
Rigi-company-logoRigi
Mosaic Wellness-company-logoMosaic Wellness
LimeChat-company-logoLimeChat
PropReturns-company-logoPropReturns
Dashtoon-company-logoDashtoon
IONAGE-company-logoIONAGE
PlaySimple Games-company-logoPlaySimple Games
Facets.cloud-company-logoFacets.cloud

Risk Profile

Data Access LevelInternal
Impact LevelLow
Recovery Time Objective24-48 hours
View more

Product Security

Data Security
Integrations
Multi-Factor Authentication
View more

Data Security

Backups Enabled
Data Erasure
Encryption-at-rest
View more

App Security

Responsible Disclosure
Credential Management
Software Development Lifecycle
View more

ESG

We prioritize and take environmental, social, and governance (ESG) considerations seriously in our operations and decision-making processes.

Data Privacy

Data Privacy Officer
Employee Privacy Training

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Anti-DDoS
View more

Endpoint Security

We follow industry best practices for endpoint security. We are happy to provide more details about our endpoint security practices upon request.

Network Security

Firewall
IDS/IPS
Traffic Filtering
View more

Corporate Security

We implement internal measures and practices to maintain a high standard of security.

Policies

We are currently working with experts to put together our company policies. Please contact us for more details.

Security Grades

We are constantly monitoring the security of our website. We will post our grades from public security rating agencies when they become available.

Powered bySafeBase Logo