ThreatPrevent
ThreatPrevent
Cyber Threat Intelligence
Subprocessors

Subprocessors

This page lists the third-party service providers that ThreatPrevent (“we”, “us”) engages as subprocessors when processing personal data on your behalf for our B2B services. We only engage subprocessors that provide appropriate technical and organizational data-protection safeguards and comply with GDPR-style requirements.

We may update this list from time to time. Where required by our Data Processing Agreement (DPA), we will notify you of any changes and give you a reasonable opportunity to object to new subprocessors.

Subprocessor list

The following table describes the current subprocessors we use in connection with your services. This list may grow or change as our platform evolves.

SubprocessorService providedProcessing location
CloudFlareInfrastructureWorldwide
ReSendEmail deliveryEU
CookieYesCookie Consent ManagementEU
Microsoft 365Email and collaborationEU

How we use subprocessors

  • We use subprocessors to provide infrastructure, hosting, logging, analytics, email, identity, and other technical services that support our platform.
  • Each subprocessor is bound by a contract requiring appropriate security and confidentiality measures and prohibiting unauthorized use of your data.
  • We only transfer personal data to subprocessors where adequate safeguards are in place, such as an adequacy decision, Standard Contractual Clauses, or other GDPR-approved mechanisms.

Changes to this list

  • If we add or replace a subprocessor that changes the way your data is processed or transferred, we will notify you in accordance with the DPA and, where required, provide you with a reasonable period to object.
  • You can always check this page for the latest subprocessor list.

Contact us

If you have questions about this Subprocessors page or how we use third-party services for your data, contact us at:

ThreatPrevent

privacy@threatprevent.io