Frequently Asked Questions

Find answers to common questions about Secure.com's cybersecurity platform, features, and services.

Integrations & Compatibility

What tools does Secure.com integrate with?
Secure.com has more than 200 integrations including SIEM, HRMS, IdPs (Azure AD), productivity tools, anti-malware, XDR, web app firewalls, and IaC tools—all joined through knowledge graphs that merge information to make sense of it.
Does Secure.com support AWS, Azure, and Google Cloud?
Yes, Secure.com works across AWS, Azure, and Google Cloud with cloud-native architecture and agentless discovery capabilities.
Can Secure.com integrate with existing SIEM platforms?
Yes, Secure.com has an embedded SIEM capability which can work together with other SIEM platforms via an integration framework that complements your existing setup.
Does Secure.com work with EDR and XDR solutions?
Yes, Secure.com integrates with EDR and XDR solutions to ingest telemetry data for comprehensive threat detection and automated response workflows.
Can Secure.com integrate with identity providers like Okta or Azure AD?
Yes, Secure.com integrates with major IdPs including Azure AD and Okta for continuous identity monitoring and access management.
Does Secure.com integrate with ticketing tools like Jira?
Yes, Secure.com integrates with ticketing systems like Jira through APIs to ensure smooth case management and incident tracking.
Can Secure.com ingest firewall and network logs?
Yes, Secure.com ingests telemetry from firewalls, network sensors, and endpoints through its unified integration framework.
Does Secure.com support SaaS application monitoring?
Yes, Secure.com monitors SaaS applications through its Application Security module, providing continuous application security posture management.
Can Secure.com run in hybrid or multi-cloud environments?
Yes, Secure.com's microservices-based architecture supports hybrid and multi-cloud deployments with container-orchestrated scalability.
Is there an API for custom Secure.com integrations?
Yes, Secure.com provides APIs for custom integrations and workflow automation through its drag-and-drop no-code platform.

Security, Privacy & Trust

How does Secure.com protect customer security data?
Secure.com follows security-by-design principles through encrypting information both at rest and in transit, implementing least privilege access control, and closely monitoring its infrastructure.
Where is data processed and stored by Secure.com?
Secure.com's cloud-native architecture supports multi-region deployment with data sovereignty compliance and encryption at rest and in transit as standard.
Is Secure.com built with security-by-design principles?
Yes, Secure.com is built with security-by-design principles including RBAC enforcement, automated compliance mapping, and continuous security controls from the ground up.
Does Secure.com allow human oversight of AI actions?
Yes, Secure.com implements human-in-the-loop governance where teams can override AI decisions and require approval for critical actions.
How does Secure.com ensure AI decision transparency?
Secure.com provides explainable AI with audit trails showing reasoning behind every decision, action taken, and investigation path followed.
Can Secure.com be trusted with sensitive security telemetry?
Yes, Secure.com undergoes third-party security audits, maintains audit-ready evidence collection, and follows strict data protection standards for handling sensitive telemetry.
Does Secure.com undergo third-party security audits?
Yes, Secure.com maintains continuous compliance monitoring and undergoes regular third-party security audits to validate its security posture.
How does Secure.com manage internal infrastructure security?
Secure.com monitors its own infrastructure with the same AI-driven capabilities it provides customers, including continuous threat detection and automated response.
Is Secure.com suitable for regulated industries?
Yes, Secure.com supports continuous compliance across multiple frameworks (ISO 27001, PCI DSS, HIPAA, NIST CSF) with audit-ready evidence collection for regulated industries.
How does Secure.com reduce overall security risk?
Secure.com reduces risk by automating 70% of case handling, cutting MTTR by 45-55%, reducing blind spots by 40%, and enabling proactive threat mitigation through attack path analysis and continuous monitoring.

Security & Privacy Claims (Compliance-Specific)

Is Secure.com SOC 2 Type II compliant?
Secure.com maintains continuous compliance monitoring aligned with SOC 2 Type II standards and undergoes regular third-party security audits.
Does Secure.com support GDPR requirements?
Yes, Secure.com includes GDPR compliance mappings with automated compliance monitoring and data protection controls.
Can Secure.com help with ISO 27001 alignment?
Yes, Secure.com supports ISO 27001 alignment through continuous compliance monitoring and automated evidence collection.
Does Secure.com support continuous compliance monitoring?
Yes, the platform features continuous compliance drift monitoring across multiple frameworks including ISO 27001, PCI DSS, HIPAA, and NIST CSF.
What encryption standards does Secure.com use?
Secure.com employs industry-standard encryption for data at rest and in transit, with secure key management practices.
Does Secure.com store customer data in encrypted form?
Yes, all customer data is stored encrypted with strict access controls and encryption key management.
Can customers request data deletion?
Yes, Secure.com supports data deletion requests in compliance with data protection regulations like GDPR.
Does Secure.com share data with third parties?
No, Secure.com does not share customer data with third parties except as required by law or with explicit customer consent.
How does Secure.com handle legal data requests?
Secure.com follows documented legal processes for data requests, with audit trails and customer notification where legally permissible.
Is Secure.com audit-ready at all times?
Yes, Secure.com maintains audit-ready evidence collection with detailed logs of all security actions and compliance posture.

Implementation & Technical Support

How long does it take to deploy Secure.com?
Initial setup typically takes 30 minutes with White Glove onboarding support, representing a 30% reduction in setup time compared to traditional security platforms.
What is the Secure.com onboarding process?
After signing, customers undergo a streamlined 4-step onboarding process with minimal client input and dedicated Customer Success Manager (CSM) support, aimed at ensuring an optimal setup while causing as little disruption as possible.
Does Secure.com offer White Glove onboarding?
Yes, Secure.com provides White Glove onboarding services with dedicated support for implementation and configuration.
What technical setup is required to get started?
Getting started with Secure.com requires only API configuration with your existing security tools—no software installation or agent deployment needed.
Does Secure.com require agents to be installed?
No, Secure.com uses agentless asset discovery via API polling, eliminating the need for agent deployment and reducing operational overhead.
Can Secure.com be deployed incrementally?
Yes, Secure.com's platform comprises modular microservices, so clients can deploy as per their immediate needs or priorities.
How much internal effort is needed for setup?
Setup requires minimal internal effort, saving 10+ hours/week compared to traditional integrations, with most configuration handled through APIs.
Is training required to use Secure.com?
Basic training is recommended to maximize platform value, though the natural language interface makes the platform intuitive for all skill levels.
How does Secure.com support SOC maturity improvement?
Secure.com elevates SOC maturity through AI-assisted threat hunting, automated incident response, and advanced playbook customization that scales team capabilities.
Can Secure.com be customized during implementation?
Yes, the drag-and-drop workflow automation platform allows extensive customization for security use cases without coding.

Use Cases & Outcomes

What problems does Secure.com solve best?
Secure.com addresses alert fatigue, slow incident response, manual investigations, skill shortages, and tool sprawl by automating 70% of case handling and cutting MTTR by 45-55%.
How do SOC teams use Secure.com day to day?
Teams use Digital Security Teammates for natural language queries, automated alert triage, investigation assistance, and orchestrated response workflows across L1-L3 functions.
Can Secure.com help reduce alert fatigue?
Yes, Secure.com reduces alert noise through intelligent correlation, automated triage, and risk-based prioritization using business context.
How does Secure.com improve incident response speed?
Secure.com optimizes MTTD by 30-40% and MTTR by 45-55% through ML-driven event correlation, automated investigation, and orchestrated response workflows.
Does Secure.com help prevent security breaches?
Yes, Secure.com helps prevent breaches through predictive risk modeling, continuous monitoring, attack path analysis, and proactive remediation that identifies and fixes vulnerabilities before exploitation.
Can Secure.com support lean security teams?
Yes, Secure.com acts as a force multiplier, automating repetitive tasks and providing L1-L2 analyst capabilities so lean teams can focus on strategic work.
How does Secure.com help CISOs make better decisions?
Secure.com provides executive-level risk reporting, business context mapping, and actionable insights for strategic security decision-making.
What outcomes do mid-market companies see with Secure.com?
Mid-market companies report 40% reduction in blind spots, 176 analyst hours saved per month, 70% faster MTTD, 45-55% faster MTTR, and measurable cost reductions through tool consolidation and automation.
How does Secure.com reduce analyst burnout?
By automating 70% of repetitive investigations, eliminating alert fatigue through intelligent prioritization, and freeing analysts for meaningful strategic work.
What measurable results do customers report?
Customers report 50% reduction in tool sprawl, 45-55% faster MTTR, 176 analyst hours saved per month, and cost reductions averaging $25K-$50K annually through automation and consolidation.

Usage & Practical Concerns

Is Secure.com easy to use for security teams?
Yes, Azad (Secure.com's conversational AI assistant) enables both technical and non-technical users to query, investigate, and act using natural language commands.
Can non-experts interact with Secure.com safely?
Yes, role-based access controls and human-in-the-loop safeguards ensure non-experts can use Secure.com safely within defined permissions.
How does Secure.com handle false positives?
Secure.com uses ML-driven correlation, threat intelligence, and behavioral analytics to distinguish real threats from false positives, reducing false positive rates by up to 80%.
What happens when Secure.com detects a critical threat?
Secure.com immediately escalates critical threats with enriched context, suggests response actions, and can execute automated containment playbooks if configured.
Can Secure.com explain why an action was taken?
Yes, every action includes transparent reasoning with audit trails showing investigation steps, data sources, and decision logic.
Does Secure.com require constant human monitoring?
No, Secure.com operates continuously with automated monitoring, though human oversight is recommended for strategic decisions and complex incidents.
Can Secure.com run continuously without downtime?
Yes, the cloud-native architecture ensures continuous operation with real-time data fetching and enhanced dashboards.
How does Secure.com prioritize alerts?
Alerts are prioritized using risk-based scoring that considers business context, asset criticality, threat intelligence, and potential blast radius.
Can Secure.com adapt to new threats automatically?
Yes, ML models continuously learn from fresh attack patterns, with AI-suggested workflow generation adapting to emerging threats.
What does a typical day look like using Secure.com?
Analysts start their day with a prioritized alert queue, use natural language queries via Azad to investigate events, leverage automated enrichment for context, and execute response playbooks—while the Digital Security Teammate handles routine triage tasks.

Technical Details

Does Secure.com use generative AI or machine learning?
Secure.com employs both: generative AI (LLM-powered Azad assistant) for natural language interaction and ML for anomaly detection, risk scoring, and automated correlation.
How does Secure.com perform automated investigations?
The Digital Security Teammate conducts real-time alert triage, enrichment, correlation, and response by leveraging API interoperability across 500+ integrated tools.
What is Secure.com's Living Knowledge Graph?
The Living Knowledge Graph unifies data from 500+ integrations, creating interconnected context that enables intelligent correlation, risk analysis, and business-aware prioritization.
How does Secure.com correlate alerts across tools?
ML-driven event correlation analyzes relationships between alerts from different sources, consolidating duplicates and identifying attack chains.
Does Secure.com support agentless asset discovery?
Yes, agentless discovery uses API polling to identify machines, apps, and relationships, constructing a CMDB with international standards.
How does Secure.com reduce mean time to response?
Through automated triage, instant enrichment, intelligent routing, and orchestrated playbook execution—cutting MTTR by 45-55%.
Can Secure.com execute remediation workflows?
Yes, the platform supports automated remediation flows with drag-and-drop workflow creation for security use cases.
How does Secure.com handle AI errors?
With human-in-the-loop controls, teams can override AI decisions, require approval for high-impact actions, and adjust automation boundaries based on risk tolerance.
Does Secure.com support explainable AI?
Yes, every AI decision includes transparent reasoning, investigation traces, and audit logs showing how conclusions were reached.
How does Secure.com scale technically?
The microservices-based architecture with container orchestration scales dynamically based on demand, supporting enterprise-scale environments.

For Businesses & Developers

Is Secure.com enterprise-ready?
Yes, Secure.com supports large enterprises with multi-framework compliance, advanced orchestration, unlimited usage credits, and enterprise-grade security.
Can Secure.com support large security environments?
Yes, the scalable architecture handles enterprise complexity with multi-module correlation, cross-case analytics, and advanced customization.
Does Secure.com offer partner or reseller programs?
Contact Secure.com's partnership team for information about partner and reseller opportunities.
Can Secure.com be white-labeled?
Contact Secure.com for enterprise-specific solutions and customization options.
Does Secure.com provide APIs for developers?
Yes, Secure.com offers APIs for custom integrations, workflow automation, and platform extensibility.
Can Secure.com support MSP or MSSP models?
Yes, the platform's architecture and capabilities support managed service provider deployments.
Does Secure.com support multi-tenant deployments?
The modular architecture can be configured for multi-tenant scenarios—contact Secure.com for specific requirements.
Are custom workflows supported?
Yes, the drag-and-drop workflow platform enables extensive customization including API integration, compliance cases, automated reporting, and more.
Can Secure.com integrate into internal platforms?
Yes, through APIs and 500+ integrations, Secure.com can be embedded into existing internal platforms.
Does Secure.com offer enterprise-specific solutions?
Yes, the Strategic Teammate tier provides enterprise-grade features including unlimited credits, advanced orchestration, and full SOC automation.

Compatibility (User & Environment)

Is Secure.com cloud-native?
Yes, Secure.com is cloud-native with microservices architecture and container orchestration suitable for contemporary cloud settings.
Can Secure.com work with on-prem systems?
Yes, Secure.com integrates with on-premises systems through its 500+ integration framework, supporting hybrid environments.
Does Secure.com support zero-trust environments?
Yes, Secure.com supports zero-trust environments through its 500+ integration framework that connects with on-premises and cloud systems.
Is Secure.com suitable for global organizations?
Yes, the platform supports global deployments with multi-region capabilities and compliance with international standards.
Can Secure.com operate across multiple regions?
Yes, the cloud-native architecture supports multi-region deployment with data sovereignty compliance.
Does Secure.com support remote teams?
Yes, the cloud-based platform enables secure access for distributed security teams from anywhere.
Can Secure.com adapt to different security architectures?
Yes, Secure.com adapts to different security architectures through its modular, microservices-based design that accommodates diverse organizational structures and requirements.
Is Secure.com compatible with legacy tools?
Yes, API-based integrations support connectivity with legacy systems alongside modern security tools.
Does Secure.com support rapid infrastructure changes?
Yes, agentless discovery and real-time data fetching enable Secure.com to adapt automatically to infrastructure changes.
Can Secure.com scale across business units?
Yes, the platform supports enterprise-wide deployment with role-based access and customization per business unit.

Setup & Installation

What are the prerequisites for installing Secure.com?
Prerequisites include API access to existing security tools, identity providers, and systems you want to integrate.
Does Secure.com require software installation?
No, Secure.com is cloud-native and agentless, requiring only API configuration rather than software installation.
How is Secure.com connected to existing tools?
Through API integrations configured during onboarding, connecting to SIEM, EDR, firewalls, identity systems, and other security tools.
How long does the initial setup take?
Initial setup is reduced by 30% compared to traditional platforms, typically taking days rather than weeks with White Glove support.
Can Secure.com be tested before full rollout?
Contact Secure.com about demo environments and proof-of-concept options before full deployment.
Is there a sandbox or demo environment?
Contact Secure.com to request a demo or proof-of-concept environment.
Can setup be done without disrupting operations?
Yes, API-based agentless deployment and phased rollout minimize operational disruption.
Who is responsible for setup on the customer side?
Typically the security team lead or IT infrastructure team coordinates with Secure.com's implementation specialists.
Does Secure.com support phased deployment?
Yes, the modular architecture enables incremental deployment of capabilities based on priorities.
Can Secure.com be rolled back if needed?
Yes, the non-invasive API-based approach allows for graceful rollback if required.

Account Management

How do I manage my Secure.com account?
The platform provides an administrative interface with RBAC (Role-Based Access Control) for managing users, integrations, and configurations.
Can I add or remove integrations easily?
Yes, integrations can be added or removed through the platform's configuration interface without complex setup.
How does billing work on Secure.com?
Contact Secure.com for billing details specific to your tier and usage requirements.
Can I upgrade or downgrade plans?
Contact Secure.com to discuss plan changes and migration paths between tiers.
How do I export data from Secure.com?
The platform supports data export through APIs and reporting functions for auditing and compliance purposes.
What happens if I cancel Secure.com?
Contact Secure.com for offboarding procedures, including data export and access retention policies.
Can multiple users access the same account?
Yes, Secure.com supports multiple users with role-based access controls and permission management.
How are permissions managed?
Through RBAC (Role-Based Access Control) enforcement with granular permission settings per user and role.
Does Secure.com support role-based access?
Yes, comprehensive RBAC controls ensure users have appropriate permissions based on their security roles.
Can accounts be managed across teams?
Yes, the platform supports multi-team deployment with separate permissions, workflows, and visibility per team.

Customer Support

What support options does Secure.com offer?
Secure.com offers multiple support options including technical support, White Glove onboarding, comprehensive documentation, knowledge base access, and ongoing assistance.
Is 24/7 human support available?
For information on support tier availability and 24/7 coverage options, please contact Secure.com.
How fast is Secure.com's response time?
Support response times vary by service tier, with critical issues receiving priority escalation and rapid response.
Does Secure.com provide onboarding assistance?
Yes, White Glove onboarding includes dedicated support for implementation and configuration.
Is there a knowledge base or documentation?
Yes, Secure.com provides comprehensive documentation and knowledge resources for platform usage.
Can customers request live assistance?
Yes, live assistance is available through support channels based on your service tier.
Does Secure.com offer security expertise beyond AI?
Yes, apart from the platform's technical support, there is a team of security professionals providing strategic advice.
How does Secure.com handle critical incidents?
Critical incidents receive priority escalation with rapid response from technical specialists.
Is ongoing support included in pricing?
Yes, ongoing technical support is included, with specific coverage levels varying by tier.
How does Secure.com support long-term customers?
Secure.com supports long-term customers through continuous platform updates, evolving playbooks, strategic guidance, and partnership in security maturity growth.

Security Questions & Practices

What security practices does Secure.com follow internally?
Secure.com implements continuous monitoring, least-privilege access, MFA, third-party audits, and security-by-design principles across its infrastructure.
How does Secure.com enforce least-privilege access?
Through RBAC enforcement with granular permissions ensuring users and systems have only necessary access rights.
Does Secure.com support multi-factor authentication (MFA)?
Yes, MFA is supported and recommended for all user accounts accessing the platform.
How are security incidents handled within Secure.com?
Internal incidents follow documented playbooks with automated detection, immediate escalation, and transparent communication to affected customers.
How does Secure.com monitor its own infrastructure?
Secure.com applies its own AI-driven monitoring, threat detection, and automated response capabilities to protect its infrastructure.
Are security actions logged and auditable in Secure.com?
Yes, all actions generate comprehensive audit logs with detailed reasoning, timestamps, and user attribution.
How does Secure.com validate AI-driven security actions?
Through human-in-the-loop validation, explainable AI reasoning, and conditions for requiring approval on critical actions.
Does Secure.com maintain internal security playbooks?
Yes, Secure.com maintains and continuously updates internal playbooks for incident response and security operations.
How does Secure.com handle insider threat risks?
Through continuous identity monitoring, anomaly detection, least-privilege enforcement, and comprehensive audit logging.
How often are Secure.com security controls reviewed?
Security controls undergo continuous monitoring with regular third-party audits and compliance validation.

Compliance & Legal

What compliance frameworks does Secure.com align with?
Secure.com aligns with ISO 27001, PCI DSS, HIPAA, NIST CSF, GDPR, and other compliance frameworks through continuous monitoring and automated evidence collection.
How does Secure.com support customer compliance obligations?
Through automated compliance monitoring, continuous evidence collection, multi-framework support (ISO 27001, SOC 2, PCI DSS, HIPAA, GDPR), and audit-ready documentation generation.
Does Secure.com provide documentation for legal review?
Yes, Secure.com provides compliance documentation, security policies, and legal agreements for procurement review.
How does Secure.com handle regulatory changes?
The platform updates compliance mappings and controls to reflect regulatory changes, with customer notification of relevant updates.
What data protection laws does Secure.com comply with?
Secure.com complies with GDPR, CCPA, and other major data privacy regulations through appropriate technical and organizational measures.
How does Secure.com manage cross-border data transfers?
Through compliance with international data transfer frameworks and data sovereignty controls based on regional requirements.
Are data processing agreements (DPAs) available?
Yes, Secure.com provides DPAs and other legal documentation required for enterprise procurement.
How does Secure.com support audit and legal discovery?
Through comprehensive audit trails, automated evidence collection, data export capabilities, and documented compliance posture.
What happens to customer data if Secure.com is acquired?
Customer data protection remains intact in the event of acquisition through contractual safeguards and customer notification provisions.
How does Secure.com handle compliance for regulated industries?
Through industry-specific compliance mappings (healthcare, financial services, etc.) with appropriate controls and continuous monitoring.

Governance, Risk & Accountability

How does Secure.com govern AI-driven security decisions?
Secure.com governs AI-driven security decisions through human-in-the-loop governance, explainable AI, approval requirements for critical actions, and comprehensive audit trails.
Who is accountable for actions taken by Secure.com's AI?
Accountability for AI-driven actions ultimately rests with the customer's security team, while Secure.com provides transparent reasoning and safe automation boundaries to support responsible governance.
How does Secure.com support human-in-the-loop governance?
The platform enables human-in-the-loop governance by requiring approval for high-risk actions, providing controls to adjust automation boundaries, and escalating complex decisions to human analysts.
Can security teams override AI decisions in Secure.com?
Yes, teams have full override capability with controls to disable automation and manually direct response actions.
How does Secure.com manage operational risk?
Secure.com manages operational risk by continually assessing risk, using predictive modeling, providing dynamic risk scorecards, and prioritizing actions based on business context.
How are AI actions reviewed and approved?
High-impact actions require explicit approval, while routine actions are automatically logged for monitoring and audit purposes.
Does Secure.com provide transparency into AI reasoning?
Yes, every AI decision includes transparent reasoning with investigation traces, data sources, decision logic, and confidence levels.
How does Secure.com mitigate AI bias in security workflows?
Secure.com mitigates AI bias through diverse training data, continuous model validation, human oversight, and transparent decision-making processes.
How does Secure.com align with responsible AI principles?
By prioritizing explainability, human oversight, bias mitigation, accountability, and alignment with frameworks like NIST AI RMF.
How does Secure.com support executive-level risk reporting?
Through business context mapping, strategic risk insights, cross-module analytics, and executive dashboards with actionable intelligence.