Security and Trust at J-SAS

J-SAS is committed to protecting customer data and supporting security and compliance requirements through industry-recognized controls and practices.

Security Overview

Comprehensive safeguards designed to protect your data and support compliance requirements

Compliance 

SOC 2 Type II

J-SAS is certified SOC2 Type II compliant, which is the highest standard for data security as defined by the AICPE.

Subprocessors

  • Microsoft Azure
  • Elastic

Security & Compliance Assurance

J-SAS maintains a mature security program aligned with recognized frameworks. We have completed a SOC 2 Type II examination evaluating the design and operating effectiveness of our controls over time.

Data Protection & Encryption

Customer data is protected using encryption in transit and at rest. These safeguards help prevent unauthorized access and support confidentiality requirements.

Identity & Access Management

ProtechSuite supports role-based access controls and multi-factor authentication to ensure users only have access appropriate to their role.

Audit Trails & Monitoring

Key system activities are logged to support monitoring, accountability, and audit requirements. Audit trails can be used to demonstrate control operation over time.

Secure Software Development

J-SAS follows secure development practices aligned with industry standards to reduce risk throughout the software lifecycle.

Transparency & Due Diligence

Security documentation and supporting materials may be shared with customers and prospects upon request, subject to a non-disclosure agreement. Questions related to security or compliance may be directed to info@j-sas.com.

Frequently asked questions

Common questions about our security and compliance practices

Security is a core focus at J-SAS. We follow industry-recognized security and compliance practices designed to protect customer data and support regulatory and assurance requirements.

J-SAS has completed a SOC 2 Type II examination, which evaluates the design and operating effectiveness of controls over a defined period of time. This assessment demonstrates our commitment to maintaining strong controls related to security.

Founded was founded in 2012, J-SAS strives to make compliance easy by minimizing effort to gain trust and win business.

 

ProtechSuite uses a combination of technical and administrative safeguards designed to protect customer data and reduce the risk of unauthorized access. These controls include encryption of data in transit and at rest, role-based access controls to limit access based on job function, multi-factor authentication for user accounts, and audit logging of key system activities.

Together, these measures support ongoing monitoring, accountability, and alignment with common security and compliance frameworks.

ProtechSuite requires users to use complex passwords which contain a combination of upper and lowercase letters, numbers, and symbols. Customers may also utilize single sign-on (SSO) through Microsoft.

 

All communication between client and server is performed over a 256-bit TLS connection. This is the strongest, most secure form of encryption that is generally available in internet browsers on the market today.

ProtechSuite is designed to logically separate customer data to prevent unauthorized access between customers. Data within ProtechSuite is isolated using access controls and application-level safeguards so that each customer can only access their own information.

Access to customer data is restricted based on authenticated user roles and permissions, and administrative access is tightly controlled. These controls are reviewed and tested as part of our broader security and compliance program, including our SOC 2 Type II examination.

To obtain a copy, please request one through our Contact Us page. You will need to execute our NDA.

Contact Us

Contact us for a no cost, no commitment assessment of your technology or security needs. We will be happy to discuss your needs in more details.

Book a Demo

Ready to simplify your compliance journey and partner it with your cybersecurity defence strategy? Book a demo to explore the possibilities.
© 2026 J-SAS Inc. All Rights Reserved.
Compliance Made Easy: Minimize Effort, Gain Trust, Win Business
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.