Start your security review
View & download sensitive information
Ask for information
Search items
ControlK
Welcome to Coralogix's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.
Curve-company-logoCurve
Imperva-company-logoImperva
WSC Sports-company-logoWSC Sports
CoinDCX-company-logoCoinDCX
Razorpay-company-logoRazorpay
Armis-company-logoArmis
Yotpo-company-logoYotpo
MasterClass-company-logoMasterClass
Tradeweb-company-logoTradeweb
Payoneer-company-logoPayoneer
PUMA-company-logoPUMA
monday.com-company-logomonday.com

Documents

REPORTSData Flow Diagram (DFD)
Trust Center Updates

SOC 2 Control Bridge letter – May 2025

Copy link
Compliance
We have uploaded a SOC 2 Bridge Letter to our Trust Center, covering the period following the end of our recent SOC 2 Type II report. This letter affirms that:
  1. The controls evaluated during our last SOC 2 audit remain in place and operate effectively.
  2. No material changes have occurred in the control environment besides mitigation activities noted in the report.
  3. No control failures or security incidents have occurred that would compromise our systems' integrity or reliability.
This interim attestation ensures continuity of trust and transparency until the next SOC 2 report is finalized. We anticipate publishing the updated SOC 2 Type II report in the coming months and will provide an update once it is available.

Sub-processors Update

Subprocessors

Coralogix will be adding Zendesk, Superhuman, GCP and Azure to Authorized Subprocessors List

We will be adding Zendesk, Superhuman, Microsoft Azure and Alphabet's GCP to our list of authorized sub-processors.
  • Zendesk: will be used to manage customer support communications for Snowbit.
  • Superhuman: will be used to streamline email communication workflows.
  • Azure: will be used in the context of our AI Center.
  • GCP: will be used as a hosting provider (only for customers who wish to be hosted there).
These subprocessors were assessed and approved according to our internal vendor risk management and data protection policies. We remain committed to transparency and to upholding the highest standards of security and privacy.
Built onSafeBase by Drata Logo