Get ultimate protection this festive period with our Proof of Value (PoV), 3 month non-committal offer. Sign up today.
We ask that you:
Please do not:
If you follow these guidelines when reporting an issue to us, we commit to:
We take cyber security vulnerabilities very seriously. As a responsible company, we regularly work with parties to identify and disclose any security vulnerabilities that we find. Our aim is to protect users and ensure that any potential security risks are addressed promptly.
To achieve this goal, we have established a clear process for reporting security vulnerabilities. If we identify a security vulnerability, we will report it immediately, providing a link to our verification page to ensure the accuracy of our findings.
We will then make contact with the relevant parties to responsibly disclose the vulnerability. Our aim is to work collaboratively with the parties involved to ensure that the issue is resolved as quickly as possible. However, we understand that not all parties will respond or take appropriate action.
If we have not received a response within 60 calendar days, we will proceed with responsibly disclosing the vulnerability. We believe that transparency is important in protecting users, and publishing information about security vulnerabilities is a vital part of this process.
In cases where parties do not intend to fix the disclosed issues, we will publish the vulnerability to encourage remediation. This approach helps to ensure that any potential security risks are addressed promptly and transparently.
At e2e-assure, we believe that security is everyone’s responsibility. By regularly reporting security vulnerabilities and working with relevant parties, we are committed to keeping our users safe and secure.
To report security issues, contact security@e2e-assure.com
In our latest independent research we surveyed 500 cyber risk owners and 1000 employees, to truly understand future internal threats for businesses in 2025. Read now to gain valuable insights on workforce disconnect and the threats from AI adoption.