Trust Portal

Push Security brings real-time detection and response into the browser. This Trust Portal provides transparency into our security controls, compliance certifications, and operational security practices.

Push is trusted by

Compliance & Certifications

We maintain industry-leading security certifications and comply with global regulatory standards.

Documents

PRODUCT SECURITY

Browser Extension Attack Model

Security Controls

Product Security Features

Real-time threat detection
Identity attack surface management
Single Sign-On (SSO) support
Multi-factor authentication (MFA)
Role-based access control (RBAC)
+4 more
View all details

Application Security

Secure development lifecycle (SDLC)
External vulnerability disclosure program
Annual penetration testing
Hardnened extension deployment
Vulnerability scanning and management
+7 more
View all details

Data Security & Privacy

Data encryption at rest
Data encryption in transit
Data residency and location controls
Data retention and deletion policies
Data inventory and classification
+5 more
View all details

Infrastructure & Cloud Security

Cloud security posture
Infrastructure as Code (IaC)
Network segmentation
Web Application Firewall (WAF)
DDoS protection
+9 more
View all details

Business Continuity & Availability

Disaster recovery plan
Backup strategy
High availability architecture
Geographic redundancy
Uptime SLA
+1 more
View all details

Vendor & Third-Party Risk

Vendor security assessment
Annual vendor reassessment
Subprocessor list
Vendor contract security requirements
Critical vendor identification
+2 more
View all details

Employee Security

Background checks
Security awareness training
Security self-assessment
Clean desk/clear screen policy
Acceptable use policy
+3 more
View all details

Endpoint & Device Security

Endpoint Detection and Response (EDR)
Application allowlisting
Mobile Device Management (MDM)
Full disk encryption
Automated patch management
+5 more
View all details

Identity & Access Management

Multi-factor authentication (MFA)
Password policies
Single Sign-On (SSO)
Privileged access reviews
Just-in-time access
+3 more
View all details

Incident Response & Management

Incident response plan
Incident response testing
Security incident tracking
Incident communication procedures
Data breach notification
+3 more
View all details

Compliance & Certifications

SOC 2 Type II
GDPR compliance
Data Processing Agreement (DPA)
Privacy Policy
Terms of Service
+4 more
View all details