Product

Solutions

Pricing

Resources

close

Product

Solutions

Pricing

Resources

west

Why TrueContext

Field Service App Platform

Adapt, automate, and transform your field operation

Advanced Automation

Double the productivity, half the effort

Accelerated Digital Transformation

Iterate and deploy dynamic workflows rapidly

Enterprise-Grade Services

Digitization at speed and at scale

Compliance & Security

A platform that meets your IT requirements

Capabilities

Workflow Creation

Built for complex field environments

Mobile App

Equip your teams anywhere and in any language

Reporting & Analytics

Visibility now, predictability for tomorrow

west

Use Cases

Installation

More assets in less time with guided workflows

Maintenance & Repair

Improve asset uptime with predictive maintenance

Inspections & Compliance

Optimize your operational excellence

Environment, Health & Safety

Protect workers, the public, and the environment

Industries

Industrial Equipment

HVAC | Utilities | Elevators | Renewables

Medical Equipment

Precision for sophisticated instrumentation

Oil & Gas

Operational excellence across the energy stream

Use Case Spotlight

west

Explore

Customer Stories

TrueContext applied in enterprise environments

Ratings & Reviews

What customers say about us

Events

Explore emerging trends with us at upcoming events

Blog

Stories and insights from the field

Learn

Knowledge Base

Answers to the most common product questions

Product Documentation

TrueContext features, usage, and technical details

TrueContext University

Hands-on training to optimize your deployment

Resource Library

Content for your industry and application

Connect

Community

Collaborate with industry peers

Contact Support

Having trouble? Ask our product support team

Talk to Sales

See how TrueContext can help your business

tablet and abstract data background image

TrueContext Security Practices

Grounded in secure software development ensuring product and customer data security and privacy

Data is critical to modern field service, with many organizations dealing with sensitive information. As we enable businesses to automate their operations, our priority is to keep your data safe by building security right into the TrueContext platform.

We achieve software assurance by using industry standards and technologies:

  • Our security solutions help customers manage their security requirements across their environments.
  • Data management and resilience are fully supported through the platform.
  • The risk of security vulnerabilities is managed through comprehensive policies and practices.

In step with your compliance requirements

Enterprises often deal with sensitive customer data with specific policies set by industry regulators. TrueContext maintains third-party audit attestations supporting customer regulatory compliance requirements.

HIPAA Audited badge
HIPAA

TrueContext is verified for the HIPAA Security Rule and HITECH act to ensure all electronic health information is protected.

SOC 2 Type II audited badge
SOC 2 Type II

Certified since 2018, our SOC 2 Type II scope covers three trust service principles – Security, Availability, and Confidentiality.

Title 21 CFR 11 Audited badge
FDA

A Title 21 CFR Part 11 seal guarantees the validity, security, and audit visibility of electronic records and electronic signatures.

We are constantly striving to maintain and improve our security program. TrueContext subscribes to news and updates from industry leaders in security and vulnerability management, which allows us to stay ahead of any risks. Furthermore, we take on regular audits to verify our security and privacy practices and operations. Current compliance and attestation reports are available to customers and prospects under NDA.

Current compliance and attestation reports are available to customers and prospects under NDA. Please complete the form below or engage your account team to submit a request.

By submitting this form, you agree to our privacy policy.

Infrastructure security and resilience

Application security by design

  • Secure coding practices, including vulnerability and third-party penetration testing
  • Encrypted using TLS 1.2 or higher in transit and AES 256 at rest

Network security

  • Customer-directed data management – store information on our servers or yours
  • Incident response and disaster recovery
  • Improves upon security features of public stores such as Apple, Google, and Microsoft

Identity and access management

  • Secure global collaboration through identity and access management (SSO)
  • Custom password complexity policies

Internal security

We combine enterprise-grade encryption technology with rigorous internal processes for secure data handling.

  • Background check on all TrueContext staff
  • Mandatory monthly security awareness training for all team members
  • Employees receive access to customer data based on least-privilege principle
Security staff looking at computers
business people analazing data

Third-party compliance

Our longstanding audited compliance program gives you peace of mind in selecting a new product for your tech stack.

  • Attestations readily available to support your annual vendor audits
  • SOC 2 Type II
  • HIPAA and FDA Title 21 Part 11 third-party auditor attestations for highly regulated industries such as healthcare
GDPR logo

Our privacy program complies with global privacy laws, including the EU’s General Data Protection Regulation (GDPR) and the UK GDPR.

Compliance icon

Our Privacy Policy governs how we collect, use, and manage your personal information while providing our services to you.

Abstract image of an close quotation mark

west

Its integration with our CRM tools in our offices make it very easy to keep track of all details of our customers. On data security, this tool prevent other unauthorised parties from accessing our sensitive data through data encryption.

MYLAR A.
SYSTEMS MANAGER

This tool is highly secure and easy to scale. I like how this tool meets compliance requirements by reducing compliance risks/incidence.

Brianna W.
Software Engineer

We can smoothly import and export data thanks to the integrations with software like Salesforce and Dropbox.

Grant B.
Account Director

east

Abstract image of an open quotation mark

Frequently Asked Questions

How does TrueContext keep my data secure?

TrueContext takes the security of your data very seriously. Your information is encrypted in our systems—at rest and in-transit—at all times. Our systems are tightly controlled through comprehensive security policies and multi-layered access control systems. TrueContext critical systems are secured using an enterprise-grade corporate identity management system, including the use of multi-factor authentication and robust password policies. We conduct ongoing compliance audits, penetration testing, and automated security scans. We offer 24/7 service operations and employ dedicated incident management teams.

How is my data secured on hosted systems in the cloud?

All customer data is encrypted with the AES-256 cipher in our cloud hosted systems. We encrypt all data over HTTPS using TLS when in-transit to and from our cloud-hosted systems to customers’ apps.

Is my data also secured on iOS and Android mobile devices?

Yes. Your data is encrypted within the TrueContext app on iOS and Android as long as a passcode is enforced.

Can I access TrueContext via single sign-on (SSO)?

Yes. TrueContext supports SSO for both mobile app and web portal access.

Has TrueContext achieved SOC 2 compliance?

Yes. We have attained SOC2 Type I and Type II compliance. Our SOC 3 report is available upon request, please use the form at the bottom of this page. A detailed report is available under our non-disclosure agreement.

What’s the difference between SOC 2 Type II and other compliance certifications (such as ISO)?

SOC 2 Type II is a comprehensive assessment for an ongoing period of time. ISO, and similar certifications, are assessments at a specific point in time. SOC 2 Type II compliance enables us to demonstrate an ongoing commitment to internal control environment, policies, and procedures.

Is TrueContext HIPAA Security Rule and HITECH Act compliant?

Yes. A certified third party has verified that our controls have been evaluated against the HIPAA Security Rule and HITECH Act. It is your responsibility to ensure you have an adequate compliance program, internal processes, and that your use of TrueContext services aligns with HIPAA and the HITECH Act. Use of TrueContext contributes to HIPAA compliance, but does not guarantee it.

 Can TrueContext’s employees simply view the data in our TrueContext account?

No. TrueContext employees are prohibited—through defined organizational policies and access control systems—from viewing the data you import. Employees can access your data only after you provide explicit permission through the TrueContext portal

Does TrueContext screen employees prior to hiring?

Yes. All prospective TrueContext employees must submit to a detailed background check. The background check includes criminal, education, and past employment verification.

Do TrueContext employees adhere to secure coding guidelines?

Yes. All TrueContext developers are trained on secure coding practices (i.e. OWASP) annually. All code is double-checked using a comprehensive code review process, which enforces secure coding standards before going live.

Does TrueContext sign data processing agreements?

Yes. TrueContext has signed and works with customers to put a mutually agreed data processing agreement in place.

Does TrueContext have 24/7 security incident management capabilities?

Yes. We employ a 24/7 service operations and engineering team that monitors and resolves incidents as they occur. We use industry leading application performance monitoring and log analysis systems.

Does TrueContext have a disaster recovery strategy?

Yes. Our disaster recovery strategy has guidelines for competitive recovery point objective (RPO) and recovery time objective (RTO). We offer a RPO of 24 hours, which reflects the current handling of database snapshots. We offer a RTO of six hours, which is reflective of the time required to launch services and restore data to the recovery environment. We test the reliability of our disaster recovery strategy every quarter.

What steps has TrueContext taken to proactively mitigate Distributed Denial of Service (DDOS) attacks and other malicious attacks?

TrueContext uses Amazon Web Services’ Web Application Firewall (WAF) and Shield to minimize the effects of a DDOS attack. Both WAF and Shield allow us to permit or limit traffic through the use of custom security rules. We can also define additional WAF rules to pre-emptively block a wide range of malicious attacks.

Does TrueContext offer any specific technology for customers who provide regulated services, such as those in the medical field?

Yes. TrueContext offers many special capabilities—including, but not limited to: Data Pass-Through, Enterprise Mobility Management and Mobile Device Management, End-to-End Data Encryption, Single Sign On, User Policy Management, Authentication Management