• Platform
    Platform Overview
    Platform
    Scale and automate your vulnerability and exposure management program
    Integrations
    Discover our ecosystem of 150+ connectors
    Capabilities
    Vulnerability Aggregation
    Unify and operationalize your vulnerability data in one platform
    Risk Prioritization
    Prioritize with asset context and threat intelligence
    Vulnerability Remediation
    Automate workflows to prioritize and mitigate critical exposures
    Vulnerability Intelligence
    Enrich vulnerability findings with real-world threat intelligence
    Asset Management
    Unify asset data to automate your vulnerability and exposure management
    Plan of Action and Milestones (POAM)
    Automate POA&M compliance at scale
    Compliance Frameworks
    Align with compliance framework controls and requirements.
  • Solutions
    Public Sector
    Federal Government
    Vulnerability and exposure management for government agencies
    State, Local, and Education (SLED)
    Centralize security and simplify compliance for state and local government
    Use Cases
    Exposure Management
    Scale and automate your exposure management program
    Risk-Based Vulnerability Management
    Address vulnerabilities with risk-based context and prioritization
    Application Security
    Shift left application security with production risk context
    Cloud Vulnerability and Exposure Management
    Conquer critical exposures across hybrid clouds
    Featured Report
    GigaOm Radar Report
    Nucleus Named Leader in GigaOM Radar Report for Continuous Vulnerability Management

    The GigaOm Radar for Continuous Vulnerability Management (CVM) report offers an in-depth evaluation of the top solutions in the market.

    GET THE REPORT
  • Pricing
  • Resources
    Resources
    Resource Library
    Discover customer stories, reports, research, and more
    Blog
    Stay informed with the Nucleus Node blog
    Webinars
    Learn from industry experts and Nucleus leaders
    Events
    Meet with us virtually and in-person
    Featured Resources

    Achieving Continuous Exposure Management in Cloud-Native Environments

    LEARN MORE

    Orange Cyberdefense Customer Story

    LEARN MORE
    Featured Articles

    RSAC 2025: The Turning Point for AI in Enterprise Security?

    READ MORE

    Conquering the Chaos of Vulnerability and Exposure Management at RSAC Conference 2025

    READ MORE
    Featured Webinars

    From Chaos to Clarity: Modern Vulnerability Management for Siloed Teams

    OPEN WEBINAR

    POAM Process Automation: Breaking the Manual Grind

    OPEN WEBINAR
    Featured Events

    FIRST Conference 2025

    LEARN MORE

    Gartner Security & Risk Management Summit

    LEARN MORE
  • Company
    Partners
    Partners
    Check out our growing roster of strategic partners
    Partner Program
    Learn more and become a Nucleus Security partner
    Deal Registration
    Register deals easily with us
    About
    About Nucleus
    Learn more about who we are as a company
    Careers
    Explore our current openings and join the team
    News
    Read the latest news and articles
    Contact
    Reach out to the Nucleus team
    Featured Content
    Build vs Buy
    Vulnerability Management: Build vs. Buy

    Discover why building a vulnerability management solution in-house isn’t the best option for your enterprise.

    LEARN MORE
Watch A Demo

Security

Security Approach

At Nucleus we believe in strong and accurate security measures. Our founders’ have a background working in vulnerability management for large data-sensitive organization, security is a priority for the Nucleus team. We understand how important it is for our customers to trust our services and are committed to transparency in the controls we use to secure our entire infrastructure. To achieve the highest levels of security, we utilize a variety of tools, processes, and technologies to help control the environment. At the center of everything, we utilize Nucleus to help us manage our workflows and analysis, and due to this we are very confident in the security posture of our organization and all our instances.

Application Security

We utilize a full suite of secure software development activities and controls. All of our developers utilize secure coding practices, and we leverage as many security functions as are available within the development frameworks we use. We have secure coding practices mandated in our Development Style Guide, which provides guidance to all developers on implementing secure code from the beginning of the development lifecycle through to deployment of the application release. Because we have access to a variety of scanning tools through our partners, all of our code is tested with multiple SAST, SCA, and DAST tools regularly. We combine the findings from all of these tools within Nucleus to leverage as many of the strengths of the individual tools as possible. All of our applications are scanned prior to a new release being pushed out to production. We have a team of users responsible for fixing any issues discovered in the vulnerability scans, and track finding status through the Nucleus platform. Additionally, Nucleus Security has completed the SOC-2 compliance process for Nucleus itself. We also conduct regular and scheduled 3rd party penetration tests and audits in order to ensure that we have been tested adequately against sophisticated attacks. Tests include: regular and continuous phishing. In addition to the secure development activities we employ, we utilize numerous controls to protect our client data. Some of, but not all of, the controls are as follows:

  • Encrypted Data at rest using industry best practices
  • Passwords stored in a salted hash
  • Encryption of all network traffic with TLS
  • Central logging and alerting
  • Locked down and hardened Nucleus instances with specific controls in place to minimize attack surface

Data Center

The data centers we use maintains a multitude of certifications which we can provide when requested. These certifications include but are not limited to:

  • FedRAMP (Available only in US regions)
  • ISO27001
  • AICPA SOC-I & II
  • PCI
  • C5
  • IRAP

All customer data is stored within a facility which meets these standards. Additionally, for overseas clients, we work with you to determine which region of the world you would like your data center to be based, so that you can meet local compliance requirements as well. Additionally, we have extra common-sense security controls on top of the compliance frameworks in use in order to minimize attack surface. We conduct nightly vulnerability scanning of our network infrastructure with a variety of Network Security tools. We combine the findings from all of these tools within Nucleus to leverage as many of the strengths of the individual tools as possible. Similar to the application vulnerabilities, we have a team of users responsible for fixing any issues discovered in the vulnerability scans, and track finding status through the Nucleus platform. The compliance certifications which our data centers meet also applies to physical security controls.

See for Yourself

Don’t just take our word for it. The proof is in the pudding, as they say. We have a couple of ways that you can easily see that we take security seriously. There are multiple websites that will do a quick analysis of your url for free, which we would recommend that you take a look at:

  • The first is: https://securityheaders.com/. Enter in the url of your trial instance or client instance and take a look to see how we are doing.
  • The second resource is ssl labs, provided by Qualys, which can be found here: https://www.ssllabs.com/ssltest/. Enter the url of your nucleus instance or a trial instance and see how we are doing! If you see something that you don’t like, feel free to reach out to us.
Contents
  • Platform
    • Platform Overview
    • Integrations
    • Vulnerability Aggregation
    • Risk Prioritization
    • Vulnerability Remediation
    • Vulnerability Intelligence
    • Plans of Actions & Milestones (POAM)
  • Solutions
    • Exposure Management
    • Risk Based Vulnerability Management (RBVM)
    • Application Security
    • Cloud Vulnerability & Exposure Management
    • Federal
    • State / Local / Education
  • Resources
    • Resource Library
    • Blog
    • Webinars
    • Events
  • Company
    • About
    • Partners
    • Pricing
    • Careers
    • News
    • Support
    • Contact

© 2025 Nucleus Security. All rights reserved

  • Privacy Policy
  • Vulnerability Disclosure Program

Upcoming Webinar | From Chaos to Clarity: Modern Vulnerability Management for Siloed Teams | Register