Transcend's Security Certifications

Transcend regularly undergoes third-party audits, security reviews, and penetration tests to maintain security certifications under SOC 2 (Type II) and ISO 27001.

SOC 2 and ISO 27001 certifications

To request access to Transcend's SOC 2 (Type II) and ISO 27001 reports, as well as other security documentation such as penetration tests and security policies, please visit our Trust Center at security.transcend.io.

  1. Visit security.transcend.io.
  2. Request access to the Trust Center.

We need to approve the request. We will receive a notification of your request, review, and approve it.

Once approved, you will be notified via email from no-reply@vanta.com with the subject, "Transcend Inc. has shared their Trust Center with you".

  1. Open the link in your email to the Trust Center.
  2. To agree to the NDA, you need to open it first. Then you can check the box to agree to it. As standard practice, we can only share security reports under NDA.
  3. Click Submit. You will enter the Trust Center, where you can view our SOC 2 (Type II) and ISO 27001 reports, subprocessors, controls for HIPAA, SOC 2, ISO 27001, and other frameworks, FAQs, pen tests, and more.