Q37
Do you have a current SOC 2 Type II report?
SOC 2 Type II: claimed_with_trust_page
Before you share customer data with Dwolla, your compliance team needs documented proof they can be trusted. ThirdProof investigated Dwolla across 27 intelligence sources — here's what we found.
24 sources queried. 77% confidence. Every Dwolla investigation produces both a risk report and an auto-filled security questionnaire — no vendor follow-up required.
Get Dwolla's Full Report Free →Security Questionnaire — Auto-Filled
Auto-filled from public evidence • 28% complete
Q37
SOC 2 Type II: claimed_with_trust_page
Q41
Not found in FedRAMP marketplace
Q39
CFPB consent order references Dwolla's PCI Security Standards compliance for payment card processing.
Q28
Infrastructure detected: Cloudflare
Q111
Not listed on OFAC sanctions lists
Every investigation produces a full PDF report plus the complete 133-question questionnaire, mapped to SOC 2, HIPAA, PCI DSS, SIG, and more.
Get Dwolla's Full Report Free →Moderate Risk
Vendor Risk Assessment
Based on data availability and source coverage
24
Sources Queried
20
Sources With Data
March 25, 2026
Last Assessed
AI-generated analysis for Dwolla
Dwolla is a financial payments infrastructure platform providing ACH and real-time bank payment APIs, and has been assigned a Tier 3 (Moderate Risk) rating by ThirdProof's rule engine with a 77% confidence score. Dwolla demonstrates several meaningful positive signals across its security posture:
Independence Statement
All evidence in this report was independently sourced by ThirdProof from external data systems without vendor participation, notification, or review.
3 findings identified for Dwolla
A critical data source was unavailable during this investigation. Manual verification is recommended.
dwolla.com received a poor grade (D+) from Mozilla HTTP Observatory. Multiple security headers or configurations are missing. Note: This scan was performed on the marketing site (dwolla.com). The application endpoint (dashboard.dwolla.com) may have different security headers. Verify the application domain separately.
An AI-specific data usage policy was not discoverable for dwolla.com through automated scanning of common policy paths and web search. The vendor may publish relevant data handling commitments in enterprise agreement documents (DPAs, product terms, licensing portals) that are not indexed at standard public URLs. Request the vendor's Data Protection Addendum or AI-specific terms directly.
20 positive signals verified
No LEI Registry Match (Expected for Most Companies)
Business Registration →No Sanctions Matches Found
Sanctions & Watchlist Screening →Firmographic Data Available
Company Intelligence →Domain Infrastructure Healthy
Domain Analysis →Valid SSL Certificate
Domain Analysis →13 Open Ports Detected
Infrastructure Exposure →Domain Registration Unavailable
Domain Registration →Clean domain reputation
Threat Intelligence →No Hacker News Mentions
Tech Community Sentiment →Certificate Data from TLS Handshake
Certificate Transparency →Web Archive History Unavailable
Web Archive History →Domain in 21 Threat Intelligence Pulses
Threat Intelligence (OTX) →Low Abuse Score: 4% (2 reports)
IP Reputation →Clean Safe Browsing Status
Malware & Phishing Check →Clean Website Security Scan
Website Security Scan →Certification Claimed: SOC 2
Trust & Compliance Page Scan →Subprocessor Page Found (Placeholder)
Supply Chain & Subprocessor Discovery →Not Found as FDIC-Insured Institution
FDIC Institution Check →No SEC Enforcement Filings Found
SEC Filing Search →SOC 2 Compliance Claimed on Trust Page
Certification Registry Verification →Steps to address findings for Dwolla
Request the SOC 2 Type II report and bridge letter: Contact Dwolla's security team and ask for their most recent SOC 2 Type II report (Security trust principle) and a bridge letter covering the period between the audit end date and today. Check trust.dwolla.com first, or email their security contact listed at dwolla.com/security. This is the single most important compliance document for a payments infrastructure vendor.
Obtain the complete subprocessor list: Contact Dwolla's privacy team at the email listed in their Privacy Policy (dwolla.com/privacy) and request the complete, current subprocessor list. Reference trust.dwolla.com/subprocessors as the intended location. Ask for an estimated date when the page will be fully populated. Evaluate each subprocessor against your organization's third-party risk program.
Request the DPA and AI data handling terms: Ask Dwolla's legal or sales team for their standard Data Processing Addendum. Review it specifically for AI-related clauses — whether transaction data is used for model training, which AI sub-processors are named, and what opt-out rights exist. If the DPA does not address AI features, request a written statement from their security team.
Confirm TLS certificate renewal is automated: Send a brief inquiry to Dwolla's security or infrastructure team asking whether their TLS certificate renewal is automated. The certificate (issued by Google Trust Services) expires May 17, 2026 — approximately 53 days from the assessment date. Ask for confirmation once the renewed certificate is issued.
Request confirmation of HTTP security headers on the application domain: The marketing site (dwolla.com) scored D+ on HTTP security headers. Ask Dwolla to confirm the security header configuration on the application domain (dashboard.dwolla.com) and API endpoints. Request their HTTP security scanner grade for the application domain or ask for a summary of their Content Security Policy, X-Frame-Options, and HSTS configuration at the API layer.
Review the 2016 FTC enforcement action context: A 2016 TechCrunch article confirms Dwolla was fined $100,000 for misrepresenting its data security practices. Ask Dwolla's security team to briefly summarize the corrective actions taken following that enforcement, and confirm whether those practices are reflected in their current SOC 2 scope. This is particularly important for regulated industry buyers. The original enforcement action is now a decade old and should be weighted accordingly.
24 sources in this assessment
Some data sources may have had limited availability during this assessment. This does not reflect negatively on the vendor.
Are you Dwolla? Claim this profile to complete your security record. Buyers are reviewing this profile now.
Claim this profile →Is Dwolla on any OFAC, EU, or UN sanctions list? Are any officers or affiliates flagged?
What is Dwolla's security posture? Threat intelligence scanning, known vulnerabilities, and security header analysis.
Is Dwolla a legitimately registered business entity? Corporate status, jurisdiction, and officer verification.
Has Dwolla appeared in negative news coverage? Data breaches, lawsuits, regulatory actions, and complaints.
Is Dwolla's website secure? TLS configuration, DNS hygiene, security headers, and domain age analysis.
What are Dwolla's firmographics? Employee count, industry classification, technology stack, and corporate structure.
Does Dwolla claim SOC 2, ISO 27001, HITRUST, or FedRAMP? ThirdProof scans trust pages for certification claims and cross-references the FedRAMP public registry for independent verification.
Who does Dwolla depend on? ThirdProof discovers subprocessors from vendor-published pages and runs sanctions screening and safe browsing checks against each one.
Has Dwolla appeared in SEC enforcement filings? Is it associated with any FDIC bank failures? ThirdProof searches regulatory databases with entity verification to confirm attribution.
Full methodology, rule engine, and AI disclosure: /methodology
Seeing this in an audit? ThirdProof lets you investigate Dwolla and every other vendor in your stack — average report time: 7 minutes. Get Dwolla's Full Report Free →
SOC 2 CC9.2, HIPAA, PCI-DSS, and CMMC all require documented vendor due diligence — not just knowing the answer, but having audit-ready evidence you verified it. Most compliance teams can't produce that documentation on demand.
ThirdProof investigates Dwolla across 27 intelligence sources in an average of 7 minutes — sanctions screening, cyber posture, SOC 2 verification, FedRAMP status, and more. Every investigation produces two deliverables: an audit-ready risk report and an auto-filled security questionnaire your prospects and auditors expect to see.
Replaces $600–$900 in manual compliance consulting time per vendor assessed.