Skip to main content
Skip table of contents

Thru Network Security Architecture

Technical Documentation

Introduction

This document details the security practices at Thru to ensure data stored and transferred by Thru meets the highest standards to minimize risk and exposure. 

We follow the zero-trust security model and adhere to the following frameworks and certifications: NIST, SOC2 and ISO/IEC 27001.

Thru is hosted in Microsoft Azure data centers and we adhere to a defense in depth (DiD) model outlined in the document. 

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.