Our Commitment to Security

At Catalogic, we prioritize the security of the data entrusted to us. Our security program
is built on industry-recognized frameworks and continuously evolves to meet the needs
of our customers and regulatory requirements.

Current Compliance Status
We are committed to maintaining and improving our security posture. Our current achievements and ongoing initiatives include:
  • SOC 2 Type I – Completed
    Catalogic has successfully undergone a SOC 2 Type I audit, demonstrating that our controls are suitably designed and implemented as of the audit date.
  • CMMC Level 1 – Affirmed
    We meet the requirements for CMMC Level 1, confirming we have the foundational cybersecurity practices in place to protect Federal Contract Information (FCI).

  • In Progress: SOC 2 Type II
    We are actively working toward SOC 2 Type II compliance,
    which evaluates the operational effectiveness of our controls
    over time.
  • In Progress: CMMC Level 2
    We are preparing for CMMC Level 2 compliance as part of our long-term commitment to improving cybersecurity maturity.

Request Compliance Documentation
Customers and prospective customers may request access to our SOC 2 Type I report or other security documentation by completing the form below.

How it works:

  1. Provide your contact details and purpose for the request.

  2. Once submitted, the form will automatically create a ticket in our system.

  3. Our Security team will review the request and share the relevant documentation with you via email.

We aim to respond promptly while ensuring that sensitive reports are shared securely and with appropriate authorization.

Whistleblowing & Incident Reporting
We encourage anyone – customers, partners, employees, or third parties – to report concerns related to the security, privacy, or integrity of our services. This may include:

  • Suspected vulnerabilities or security gaps

  • Observed failures of controls or processes

  • Misconduct or policy violations

  • Incidents or behavior posing potential risk

  • Any other issues affecting our security posture

Reports can be submitted anonymously or with contact details. All submissions are reviewed by our Security team, handled confidentially, and investigated appropriately.

If you have information to share, please use the whistleblowing form below: