Trust Center

Start your security review
View & download sensitive information
Ask for information
ControlK

Welcome to Augment's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.

Echo Global Logistics-company-logoEcho Global Logistics
Hirschbach-company-logoHirschbach
Arrive Logistics-company-logoArrive Logistics
Covenant-company-logoCovenant
Armstrong Transport Group-company-logoArmstrong Transport Group
Penske Truck Leasing-company-logoPenske Truck Leasing

Documents

REPORTSData Processing Agreement

Risk Profile

We have secure, reliable hosting that customers can depend on. We are happy to provide details about our risk mitigation practices and recovery objectives upon request.

Product Security

We pay great attention to enterprise features such as access control and single sign on. We are happy to provide more details about our enterprise features upon request.

Data Processing Agreement
Pentest Report
SOC 2 Type I Report
View more

Self-Assessments

We are working on our security compliance. We can provide completed questionnaires upon request.

Data Security

We follow industry best practices for data security. We are happy to provide more details about our data security practices upon request.

App Security

We take application security seriously and are putting together a program to monitor internal apps.

AI

We take the usage of AI seriously in our organization and work to ensure security and reliability of the AI.

ESG

We prioritize and take environmental, social, and governance (ESG) considerations seriously in our operations and decision-making processes.

Data Privacy

Privacy of customer data is top of mind. We follow industry best practices and follow all applicable privacy regulations.

Access Control

Access is tightly monitored and controlled at our company. We are happy to provide more details about our access control practices upon request.

Infrastructure

We take great care to work with best-in-class infrastructure providers that provide secure computing and storage. We are happy to provide more details about our infrastructure upon request.

Endpoint Security

We follow industry best practices for endpoint security. We are happy to provide more details about our endpoint security practices upon request.

Network Security

We protect our corporate network against external & internal threats.

Corporate Security

We implement internal measures and practices to maintain a high standard of security.

Policies

We are currently working with experts to put together our company policies. Please contact us for more details.

Security Grades

We are constantly monitoring the security of our website. We will post our grades from public security rating agencies when they become available.

Incident Response

We have a dedicated team that responds to security incidents. We are happy to provide more details about our incident response practices upon request.

Risk Management

We have a dedicated team that manages security risks. We are happy to provide more details about our risk management practices upon request.

Asset Management

We have strict asset management policies in place to ensure that all assets are accounted for and secure.

BC/DR

We have a business continuity plan in place to ensure that we can continue to operate in the event of a disaster.

Training

We provide security awareness training to all employees to ensure that they are aware of security best practices.

Change Management

We have a change and configuration management process in place to ensure that changes are properly reviewed and approved.

Physical & Environment

We have physical and environmental controls in place to ensure that our data centers are secure and reliable.

Continuous Monitoring

We continuously monitor our systems for security threats and vulnerabilities. We are happy to provide more details about our continuous monitoring practices upon request.

Trust Center Updates

SOC 2 Type II Certified

Copy link
Compliance

SOC 2 Type II — Certified ✓

Augment has successfully completed its SOC 2 Type II audit and received an unqualified opinion from Prescient Assurance LLC, an independent CPA firm. This is the highest possible audit outcome; confirming that our security controls were both properly designed and operating effectively throughout the full observation period.


Audit Details

AuditorPrescient Assurance LLC
Observation periodAugust 26, 2025 – January 31, 2026
Trust services categoriesSecurity, Availability, and Confidentiality
Report issuedMarch 18, 2026

What Was Tested and Validated

  • Multi-factor authentication and access controls
  • AES-256 encryption at rest and TLS 1.2+ in transit
  • Role-based access control and least-privilege enforcement
  • Automated threat detection (AWS GuardDuty) and 24/7 monitoring (Datadog + PagerDuty)
  • Vulnerability scanning and third-party penetration testing
  • Change management and software development lifecycle controls
  • Backup, disaster recovery, and business continuity procedures
  • Vendor risk management
  • No security incidents occurred during the audit period

What This Means for Customers

Augment's systems and processes have been independently assessed by a licensed CPA firm over a five-month observation window, not just a point-in-time snapshot. You can be confident that the controls protecting your freight operations data are proven to work in practice, consistently, over time.


The full SOC 2 Type II report is available to customers and prospective customers upon request under NDA.

SOC 2 Type II Audit Progress Update

Compliance

Augment has successfully completed its SOC 2 Type II audit, including the full observation period covering the applicable Trust Service Criteria.

Current Status

✅ SOC 2 Type II audit completed

✅ Observation period concluded

✅ No open control gaps or remediation items

🔄 Final auditor wrap-up and CPA review/signature in progress

What This Means

Augment’s security controls were designed and operating effectively throughout the entire observation period. All testing is complete, and there are no outstanding findings. The remaining steps are standard auditor finalization and formal report issuance.

Expected Timeline

Final SOC 2 Type II report: expected within approximately 2–4 weeks

While the final report is being issued:

A SOC 2 Type II status summary is available to support customer security reviews and written auditor confirmation of audit completion can be provided upon request. If you have questions or require additional assurance materials, please contact security@goaugment.com

We are currently completing our SOC 2 Type II audit, which evaluates the effectiveness of our security controls over an observation period.

Our Type II observation period runs for five months, from August 26, 2025 to January 31, 2026. During this period, our controls have been independently assessed against the SOC 2 Trust Services Criteria to ensure they are operating effectively and consistently over time.

We are now in the final phase of the audit process and expect to share the completed SOC 2 Type II report once the auditor concludes their review.

If you have any questions or would like additional information in the meantime, please contact our team.

Built onSafeBase by Drata Logo