Security at the Core. Trust by Design.

At OX Security, protecting your data is not an afterthought; it’s our foundation. We’ve built our platform and our company on the principles of security, privacy, and transparency. From day one, we’ve embraced rigorous controls and secure development practices that go far beyond compliance checkboxes. Our customers trust us because we treat their security like our own. We are proud to be SOC 2 Type II certified and fully GDPR compliant, continuously investing in security to meet the highest standards. Whether you’re evaluating us for the first time or expanding your relationship with us, you can be confident that OX is secure by design. Email us at [email protected] if you have any additional questions.
complaince hero image

Trusted by Security Teams Worldwide

OX Security powers and protects some of the most forward-thinking companies around the globe. Our partners rely on us to deliver secure, scalable, and reliable solutions without compromise.

Certified. Compliant. Transparent.

We don’t just say we care about security; we prove it.

SOC 2 Type II

GDPR Compliance

ISO 27001 (Coming Soon)

Built Securely. Monitored Continuously.

Vulnerability Disclosure Program (VDP):
We welcome responsible security research and offer a safe harbor for good-faith reports. More information about our Vulnerability Disclosure Program can be found here: [Link to policy coming soon]

 

Application Security Practices:

OX Security’s Unified AppSec Management Platform is the pillar of our application security practices. It consolidates all critical security practices into a single system. It includes code security (SAST), open source security (SCA), secrets detection, IaC scanning, CI/CD posture checks, container image scanning, cloud misconfiguration detection, and artifact integrity validation. The platform also provides software bill of materials (SBOM) management and integrates runtime context to validate the reachability and exploitability of vulnerabilities. All findings are prioritized based on real risk, factoring in business impact, runtime exposure, and known threat intelligence. Our approach ensures that security is enforced across the SDLC, from code to production.

 

Secure Development Lifecycle:
Security gates are embedded in every stage of our software development, from design to deployment. Our CI/CD workflows are protected with artifact integrity verification, policy enforcement, and PR/MR blocking to prevent misconfigurations and vulnerable code.

 

Transparency with Control

We believe in transparency while maintaining responsible access control. Below are publicly available documents, along with others available by request for customers or prospects under NDA. To request an asset, send an email to [email protected] with the requested asset.

  • Full SOC 2 report
  • Security Whitepaper on scanning
  • Penetration Test Results Summary
  • Data Processing Agreement

Subprocessors

AWS | EU | Compute

MongoDB | EU | Database and data at rest encryption

Auth0 | EU | Admin management and authorization

DataDog | EU | Runtime and Historical log analysis

Full Story | EU | Session Analysis

Getting started is easy

Bake security into your software pipeline. A single API integration is all you need to get started.