Validated by the experts

We take security seriously. That’s why we work with LMG Security, a leader in cybersecurity testing and auditing, to perform independent monthly and annual security assessments. For more information about our latest security assessment by LMG Security, you can download the Letter of Attestation.



SecureLink is run by smart and caring professionals that truly understand the importance of cybersecurity, and are willing to go the extra mile for their customers. You can see this in the way that they invest in their cybersecurity program.  We are pleased to announce that LMG Security has now partnered with SecureLink, and will be conducting regular monthly and annual assessments of the SecureLink product.  It is a privilege to work with the SecureLink team.”

—Sherri Davidoff, Founder & CEO, LMG Security

Our security validation process

Our comprehensive internal security processes include static code analysis, industry-standard vulnerability scanning, automated unit/regression testing, and code reviews of all merge requests.

Additionally, LMG Security conducts the following assessments:

Monthly Vulnerability Scan: Multi-layer vulnerability scan of the latest versions of SecureLink for Enterprises and SecureLink for Vendors servers to identify any potential vulnerabilities.

Annual Custom Application Test: A custom security test for SecureLink for Vendors and SecureLink for Enterprises software:

  • Demonstrates how security weaknesses can be leveraged to gain unauthorized access to information resources;
  • Determines the effectiveness of novel attacks or combined techniques;
  • Reviews client-, endpoint- and server-side applications for configuration or logic issues;
  • Identifies vulnerabilities in applications or services;
  • Identifies key vulnerabilities that can realistically be exploited by hackers;
  • Conducts penetration testing against the gateway, client and server applications and the underlying operating system;
  • Reviews the packaged Gateway and client software.

Discovered a potential vulnerability?

Visit our Security Disclosure page for our policy on communicating application vulnerabilities.

close close