Saltar al contenido principal

SecurityAlways on. Always traceable.

Your COBOL estate stays protected, traceable, and under your control.

COBOLpro is built for regulated COBOL systems where source-code confidentiality, access control, audit evidence, and deployment boundaries cannot be relaxed.

Certified and compliant

COBOLpro gives security, procurement, and audit teams evidence they can review.

SOC 2

Control evidence for security, availability, confidentiality, change management, and vendor-risk review.

Structured for buyer questionnaires, audit conversations, and procurement review without publishing certificate numbers or audit dates on this page.

SOC 2 security framework badge

ISO 27001

Information-security management practices aligned to risk ownership, access review, supplier controls, and operational discipline.

Evidence can be reviewed under the appropriate commercial and confidentiality process.

ISO 27001 information security badge

GDPR

Data-handling practices shaped around purpose limitation, customer-approved access, and governed processing.

Processing scope, retention, residency, and subprocessors are handled through agreement and policy review.

GDPR data protection badge

Trusted data handling

Private repositories

Source, copybooks, JCL, job metadata, and generated artifacts are ingested through controlled project channels with scoped access.

Controlled ingestion

Customer materials move through approved paths with encrypted transfer, encrypted storage, audit trails, and project-level boundaries.

No foundation model training

Customer source code and confidential materials are not used to train foundation models.

Security controls

SSO and RBAC-ready access

Designed for enterprise identity workflows, role boundaries, least-privilege access, and customer audit review expectations.

Customer approval required

Support access is constrained to approved personnel, approved purposes, and approved windows under customer-approved workflows.

Audit logs

Administrative actions, ingestion events, artifact activity, and support touchpoints can be made reviewable for audit evidence.

Encrypted data handling

Code, generated documentation, exports, and confidential materials are handled with encrypted transfer and storage patterns.

Full ownership and flexibility

COBOLpro supports hybrid deployment so regulated teams can choose SaaS, private/VPC, or on-prem options. Data residency, retention, export, deletion, encryption management, and artifact control are governed by agreement and customer policy.

COBOLpro SaaS

A managed path for teams that want fast onboarding, centralized delivery, and procurement-ready evidence review.

Private or VPC deployment

A stronger isolation model for regulated estates that need customer-network controls and agreed residency constraints.

On-prem by agreement

A deployment option for sensitive documentation programs where source movement, residency, or operating policy requires it.

Your data. Your decisions.

You maintain control over your artifacts at all times.

Data residency

Residency is defined by agreement and the selected deployment model.

Retention policy

Retention is governed by contract, customer policy, and project requirements.

Artifact export

Customer teams control approved artifacts, evidence packs, exports, and review workflows.

Deletion governance

Deletion is handled through agreed customer policy and project closeout controls.

FAQ

How does COBOLpro protect source code and artifacts?

COBOLpro uses controlled ingestion, scoped project access, encrypted transfer and storage, audit trails, and customer-approved support access. Source code, copybooks, JCL, generated documentation, exports, and reviewer notes are treated as confidential engagement materials.

Does COBOLpro use customer code to train models?

No. Customer source code and confidential materials are not used to train foundation models. Customer materials are used to deliver the approved engagement scope and are handled under the applicable agreement and policy controls.

How are access and support requests controlled?

Access is scoped by role, project, purpose, and approved support window. Support activity is constrained to customer-approved work and can be logged for security, audit, and procurement review.

What happens to data retention, export, and deletion?

Retention, export, and deletion are governed by contract, customer policy, deployment model, and project requirements. COBOLpro works with each customer to define the control path before production work begins.

Serious about security?

Start a COBOLpro security review.