Dope Security logo - link to home page
[ menu ]
secure web gateway
dope.swg
Meet dope.swg, our direct-to-cloud proxy at the endpoint.
Pre-flight inspection
Learn more about what makes our SWG fly.
private access coming soon 
private access coming soon 
private access coming soon 
private access coming soon 
private access coming soon 
private access coming soon 
pricing
Blog
blog
thought leadership
READ ALL
Love at First Flight
How to Fly Direct with dope.security
PLG Just Got Dope
Why we embarked on a product-led journey
SOC 2 Type II
Certifiably committed to the highest standards
resources
product
Datasheet
Whitepaper
FAQs
Content
Videos
Newsroom
Events
about
our story
Our vision is to provide a first class experience.
our crew
A dope crew with passion at our core.
It’s not that we’re mad at yesterday’s cybersecurity.  Just disappointed.  So we made it better.  We made it easier.

We made it dope.
© 2022 dope.security Inc.
Made with
in California
TW
in
li
medium
EULA
Privacy Policy
GDPR & DPA
SLA
SOC 2 Type 2
Sub-Processor List
Trade Compliance
EULA
Privacy Policy
GDPR & DPA
SLA
SOC 2 Type 2
Sub-Processor List
Trade Compliance

dope.security is SOC 2 Type 2 Certified

‍

Enjoy browsing the internet knowing that you are not just secured, you’re SOC 2 certified secured with dope.security’s patented fly-direct technology.

We have prepared the accompanying description of dope.security’s (“Dope Security” or “the Company”) Cybersecurity Services system titled “Dope Security’s Description of Its Cybersecurity Services system throughout the period August 1st, 2022 through October 31st, 2022” (description), based on the criteria for a description of a service organization’s system in DC section 200, 2018 Description Criteria for a Description of a Service Organization’s System in a SOC 2® Report (AICPA, Description Criteria), (description criteria). The description is intended to provide report users with information about the Cybersecurity Services that may be useful when assessing the risks arising from interactions with Dope Security’s system, particularly information about system controls that Dope Security has designed, implemented and operated to provide reasonable assurance that its service commitments and system requirements were achieved based on the trust services criteria relevant to Security (applicable trust services criteria) set forth in TSP section 100, 2017 Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (AICPA, Trust Services Criteria).

The description indicates that complementary user entity controls that are suitably designed and operating effectively are necessary to achieve dope.security’s service commitments and system requirements based on the applicable trust services criteria. The description presents the applicable trust services criteria and the complementary user entity controls assumed in the design of Dope Security’s controls.

We confirm, to the best of our knowledge and belief, that

  • the description presents dope.security’s Cybersecurity Services system that was designed and implemented throughout the period August 1st, 2022, through October 31st, 2022, in accordance with the description criteria.
  • the controls stated in the description were suitably designed throughout the period August 1st, 2022, through October 31st, 2022, to provide reasonable assurance that dope.security’s service commitments and system requirements would be achieved based on the applicable trust services criteria, if its controls operated effectively throughout that period, and if user entities applied the complementary controls assumed in the design of dope.security’s controls throughout that period.
  • the controls stated in the description operated effectively throughout the period August 1st, 2022, through October 31st, 2022, to provide reasonable assurance that dope.security’s service commitments and system requirements were achieved based on the applicable trust services criteria, if complementary user entity controls assumed in the design of dope.security’s controls operated effectively throughout that period.

‍

This is the link to our Certificate of confirmation.

‍

Thank you,
dope.security

Dope Security logo - links to the home page.
It’s not that we’re mad at yesterday’s cybersecurity.  Just disappointed.  So we made it better.  We made it easier.

We made it dope.
sales@dope.security
about
Our Story
Our Crew
Newsroom
Events
compare
Forcepoint
Zscaler
Symantec
documentation
Support
User Manual
[ DOPE.FOOTER ]
© 2023 dope.security Inc.
Made with
in California
TW
twitter
in
instagram
li
linkedin
medium
medium
EULAPRIVACYLEGALmanage cookies