Assurance and Reliability are Essential
At FloQast, trust is woven into the fabric of everything we do. We deploy industry-leading safeguards to maintain the confidentiality, availability, and integrity of your data and our services.
Compliance at FloQast
We’re happy to offer the following resources to help your business validate its compliance requirements.
Our Customer FloQast Admins can access our Audit Reports and Compliance Resources directly within the FloQast application, while our Prospects can request a copy of our Audit Reports and Compliance Resources directly from their Account Executive.
Let us know if you have any questions by sending them to compliancerequests@floqast.com.
Third-Party Audits and Certifications
FloQast complies with a range of industry-standard certifications and authorizations. Check out which ones we’re compliant with.
Compliance Resources
In addition to third-party audits, FloQast makes the following documents and resources available to meet our customers’ due diligence needs.
Third-Party Audits and Certifications
SOC 1 Type 2
SOC 2 Type 2
ISO 27001
ISO 27701
ISO 42001
EU-US Data Privacy Framework
Compliance Resources
FAQs and Quick Reference Guides
SOC 3
Feel free to reach out if you have any questions or would like more information about our SOC 3 report and our commitment to safeguarding your data.
Compliance Report Bridge Letters
Third Party Penetration Test
FloQast’s Policies, including Security, Privacy, and AI
SIG Core
Privacy at FloQast
Our Privacy Principles and Data Management Standards
Transparency
Accountability
Choice and Consent
Security Safeguards
Privacy Rights
Privacy-by-Design
Security at FloQast
Application & Data Security
FloQast upholds industry leading cyber security practices
Multi-Layered Authentication
FloQast employs a multi-layered authentication process to ensure only authorized personnel can access sensitive data and systems
Secure Software Development
FloQast ensures security is designed into our product through our secure software development process
Incident Detection and Response
FloQast has a comprehensive incident response program in place to minimize the impact of security incidents and ensure a prompt and effective response
Bug Bounty Program
As part of FloQast's ongoing commitment to protecting Customer Data we maintain a bug bounty program that facilitates the efforts of white-hat hackers around the world
Security Details
Application & Data Security
Vulnerability Management
Penetration Testing
Encryption
Access Control
Secure Development
Multi-Layered Authentication
Strong Access Controls
Segregation of Duties
Multi-Factor Authentication
User Access Reviews
Security Key Management
Secure Software Development
Input Validation
Static Application Security Testing
Regular Security Testing
Incident Detection and Response
Real-time Security Events Monitoring and Alerting
Incident Response Planning
Intrusion Detection and Prevention Systems (IDP/IDS)
Bug Bounty Program
Why Does This Matter for Me as a Customer?
FloQast has a dedicated Application Security team focused on auditing changes made to our application. The team is involved in the design phase, conducts code reviews and pentest. To supplement all of these internal practices, FloQast also encourages and rewards independent researchers to find bugs in our application. By inviting researchers to audit our application we greatly expand the number of skilled individuals assessing our application and benefit from having our application battle tested every hour of the day using the latest techniques out there.
I’m a Security Researcher
If you want to report a bug, we have a public bug bounty program on HackerOne: https://hackerone.com/floqast. Any reports for https://www.floqast.com will not be accepted. Only our core application https://*.eu.floqast.app/ is in-scope. Please do not submit any reports through our Helpdesk or request a demo instance of our application through the “Book Now” button. Either of these actions will result in forfeit of any possible bounty.
AI at FloQast
FloQast’s AI Principles and Ethical Standards
Stakeholder Engagement
Continuous Improvement
Ethics and Accountability
• Risk Identification and Mitigation
• Patterns of Misuse
• AI Governance and Risk Management Policies
• Robust Security Controls
• International Technical Standards
• Data Input Measures and Protections