Product
Product
Agentic AI SOC Platform
AI SOC Analyst
AI Threat Hunter
Integrations
Use Cases
Endpoint
Email
Identity
Cloud
Data Loss Prevention (DLP)
Customers
Resources
Featured Blog
SOAR playbooks: how they work, why they break, and what's replacing them

SOAR playbooks: how they work, why they break, and what's replacing them

Learn

Videos

Events

Whitepapers & eBooks

Case Studies

Webinars

Podcast

Whitepapers & eBooks
View all resources
Articles
What is an Agentic SOC?
AI-driven Alert Investigation
Top 5 AI SOC Analyst Platforms
9 Advantages of AI SOC Analysts
What is Agentic Security?
MDR vs. Agentic AI SOC Analyst
Agentic AI vs Security Copilot
What is an Agentic AI SOC Analyst?
SOC Metrics & KPIs that Matter
AI SOC Adoption Trends
Why Prophet AI
Company
Company
About us
Partners
Careers
Press
Blog
Request a Demo
Gartner's Key Questions to Validate AI SOC Agents  Download Now

Annex III

Last Updated: May 06, 2026

Privacy Policy
Cookies

You can download a copy of the Annex III by clicking here.

LIST OF SUB-PROCESSORS

Sub-processor:

‍

Reason for Sub-processing:

Amazon Web Services

Securely host our infrastructure, ensuring reliable data storage, processing, and availability.

Microsoft Azure

Third Party Generative AI Service - access and utilize hosted AI models.

Google Cloud Platform

Third Party Generative AI Service - access and utilize hosted AI models.

Slack

Secure team communication and collaboration, which may involve processing limited customer data for support and operational purposes.

Google Workspace

Secure email, document management, and collaboration, which may involve processing customer data for communication and operational purposes.

PagerDuty

Manage and respond to critical incidents, ensuring timely issue resolution, which may involve processing Customer Data to maintain service reliability.

SerpApi

Retrieve real-time search engine results for Customer Data analysis, enhancing the accuracy and relevance of our services.

IPInfo

Obtain geolocation and IP address based information.

DNSlytics

Gather domain and IP address intelligence for security analysis.

Spur

Identify and analyze VPNs, proxies, Tor nodes, and other anonymizing infrastructure.

Elastic

Aggregate, search and analyze logs, which often contain Customer Data, error reports and system events.

Reversing Labs

File metadata and hash values are shared to perform threat intelligence and malware analysis for detecting and preventing malicious activities.

Stytch

Identity and authentication management service.

PostHog

Product and usage analytics services.

VMRay

Providing an advanced malware sandbox and phishing threat analysis. This includes automated malware triage and analysis of samples

ScrapFly

Web scraping and screenshot capture of webpages for the analysis of phishing emails and associated links.

Parallel

Providing web intelligence and search infrastructure specifically engineered for AI agents. This capability allows our AI-driven security systems to perform high-accuracy, real-time web research.

Anthropic

Third Party Generative AI Service, used for access and use of hosted AI models.

URLScan

Used for scanning URLs for malicious content. This enhances our ability to analyze and neutralize web-based threats found within emails and other data streams.

Have I Been Pwned

Used to assess if credentials for users being investigated have been compromised. This helps quickly identify user accounts at risk following a security incident or investigation.

‍

Datadog

Used to aggregate, search and analyze logs, which often contain Customer Data, error reports and system events.

‍

Pylon

‍

Used to create, process and manage support tickets, which often contain Customer Data, error reports and system events.

‍

Snowflake

Used for ad hoc analytics and generating internal operational reports, which often contain customer data.

‍

Privacy Policy
Cookies

SOC 2 Type 2 Compliant

Company

About us
Why Prophet
Careers
Partners
Press

Product

How it works
Integrations

Use Cases

Cloud
Threat Hunting
Endpoint
Phishing
Identity
Data Loss Prevention

Resources

Blog
Videos
Events
Reports & ebooks

Find us on

© 2026 Prophet Security, Inc. All rights reserved.
Privacy Policy
Exit icon

Request a demo

See for yourself how Prophet AI can supercharge your security operations, accelerating alert investigation and response

Key benefits:

  • Lowers MTTR with AI-driven automated alert triage & investigation

  • Lowers risk by prioritizing critical alerts for analyst review

  • Eliminates manual effort, freeing analysts to focus on high-impact security tasks