Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Overview

Termius gives teams various tools to effectively and securely manage their infrastructure and collaboration. Termius is a SaaS and a cross-platform application to connect to the infrastructure via SSH, Mosh, and Telnet.

Compliance

SOC 2 Logo
SOC 2
Get full access to this Security Portal
  • Review all security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Documents

20 Documents
Pentest Report
Security Whitepaper
SOC 2 Report
SOC 2
Acceptable Use Policy
Access Control Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
Data Classification Policy
Data Security Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Password Policy
Physical Security
Risk Management Policy
Software Development Lifecycle

Risk Profile

Data Access LevelRestricted
Impact LevelSevere
Recovery Time Objective24-48 Hours
See more

Product Security

Role-Based Access Control
Data Security
Multi-Factor Authentication
See more

Reports

Pentest Report
SOC 2 Report
Security Whitepaper

Self-Assessments

We are working on our security compliance. We can provide completed questionnaires upon request.

Data Security

Access Monitoring
Backups Enabled
Data Erasure
See more

App Security

Code Analysis
Software Development Lifecycle
Credential Management
See more

Access Control

Data Access
Logging
Password Security

Infrastructure

Anti-DDoS
Amazon Web Services
BC/DR
See more

Endpoint Security

Disk Encryption

Network Security

Firewall
IDS/IPS
Spoofing Protection
See more

Corporate Security

Employee Training
Incident Response
Internal Assessments
See more

Policies

Acceptable Use Policy
Access Control Policy
Asset Management Policy
See more

Security Grades

Qualys SSL Labs
Main API Endpoint
Account page
Website
GRPC API Endpoint

If you think you may have discovered a vulnerability, please send us a note.