Security

Security is in our DNA

At Zero Hash, we take security seriously. With most of our team being engineers, it runs in our culture. We work hard to ensure that everything we do is best practice, from our products to our infrastructure and company policies. We have a dedicated team of experts specializing in cybersecurity and general security practices. They work around the clock to ensure our security measures are up-to-date and effective.

We are always looking for new and innovative security technologies to improve our defenses against potential threats further. Investing in our security measures is the best defense against possible attacks.

Trusted by Global Innovators

Enterprise Grade attestation and global compliance with regulatory requirements

SOC2 Type 2

Our report shows we employ the highest control standards to ensure security, privacy, availability, and confidentiality are in place.

ISO/IEC 270001:2013

Our information security management system satisfies the requirements of the international standards ISO 27001 and 27002.

GDPR

Zerohash complies with the EU General Data Protection Regulation (GDPR)

SOC2 Type 2

Our report shows we employ the highest control standards to ensure security, privacy, availability, and confidentiality are in place.

ISO/IEC 270001:2013

Our information security management system satisfies the requirements of the international standards ISO 27001 and 27002.

GDPR

Zerohash complies with the EU General Data Protection Regulation (GDPR)

Newly introduced Vulnerability Disclosure Program (VDP)

Our Vulnerability Disclosure Program allows anyone to report security vulnerabilities in our systems and products. We welcome submissions from security researchers and ordinary users and prioritize responsible disclosure. Our security team promptly reviews and validates reported vulnerabilities and, if necessary, takes immediate action to mitigate the risk. We prioritize transparency and keep submitters updated throughout the process. We aim to ensure the security of our systems and products, and we welcome collaboration with the security community. Send your findings following our guide to: [email protected]

Privacy Policy