A formal Vulnerability Management Program is in place to identify, record, and track all vulnerabilities through remediation by system owners and administrators.
G2 monitors for vulnerabilities through quarterly vulnerability scanning. We use Coralogix for internal and external vulnerability scanning.
A vulnerability report is created based on the results of the scans, consisting of a prioritized list of vulnerabilities, vulnerability description, calculated risk, and remediation activities. We take the discovered risks and remediate them based on their severity.
G2 applies the latest patches to its systems according to the formal Patch Management Policy. The policy addresses how security patches are to be applied to systems.
When possible G2 test patches on a test environment that mirrors the production environment or device before deploying in a production environment.
Personnel are required to install security patches soon after release.
", "textValue": null, "rank": "bbbbeb", "createdAt": "2026-03-12T15:15:46.653301+00:00", "updatedAt": "2026-03-12T15:15:46.653338+00:00"}}, {"id": "7a61868a-c5f0-4434-b4de-b3d64510cf11", "type": "customerAssuranceTileItem", "attributes": {"tileId": "854fd662-5e4d-4a59-a538-946e9c29b4de", "status": "completed", "type": "status", "title": "Web Application Firewall", "content": "For our G2's hosting services G2 uses AWS to provide cloud hosting services. As such, the physical security controls are the responsibility of AWS.
For G2's Corporate Physical Security G2 protects its facilities from unauthorized access using a badge access system, visitor management, and video cameras. In offices where badges are issued, badges are always worn and are required to gain access to the facility. Doors are prohibited from being propped or held open.
Visitors sign a visitor log upon entrance that records date and time in, full name, host, purpose of visit, and e-mail address. In addition, all visitors sign a visitor non-disclosure agreement (NDA). Once within the facility, the visitor is escorted for the entirety of their visit. Visitor logs are retained indefinitely. Video cameras monitor the entrance and exit points of the facility, and the footage is retained for at least 90 days.
G2 has a process for destroying physical data once systems or physical data is no longer needed to fulfill company objectives. Paper containing sensitive information is shredded, and physical drives are pulverized.
", "textValue": null, "rank": "bbbbgb", "createdAt": "2026-03-12T15:15:46.894596+00:00", "updatedAt": "2026-03-12T15:15:46.894614+00:00"}}]}}, {"id": "d8b429b3-56da-49a1-a042-a0cbe1c36f09", "type": "customerAssuranceTile", "attributes": {"profileVersionId": "15639d24-30ae-4042-a610-140b2e0a006f", "header": "Endpoint Security", "icon": "laptop", "rank": "bbbbhb", "createdAt": "2026-03-12T15:15:46.907969+00:00", "updatedAt": "2026-03-12T15:15:46.907985+00:00"}, "relationships": {"tileItems": [{"id": "bd340365-9b1b-4952-a7ac-7ecadb55018d", "type": "customerAssuranceTileItem", "attributes": {"tileId": "d8b429b3-56da-49a1-a042-a0cbe1c36f09", "status": "completed", "type": "status", "title": "Disk Encryption", "content": "