Security

Your assets. Your data. Secured.

We take security seriously so you can focus on managing assets.

Infrastructure & Hosting

  • AWS/GCP cloud infrastructure
  • Data encrypted at rest (AES-256)
  • Data encrypted in transit (TLS)
  • SOC 2 Type II compliant (in progress)
  • Regular security audits
  • 99.9% uptime SLA

Data Protection

  • Zero-knowledge encryption option
  • Role-based access control (RBAC)
  • Multi-factor authentication (MFA)
  • Automated backups (daily)
  • Data retention policies
  • GDPR & CCPA compliant

Application Security

  • Penetration testing (annually)
  • Vulnerability scanning
  • Code review process
  • Dependency monitoring
  • Security headers & CSP

Your Controls

  • SSO/SAML integration (Enterprise)
  • IP whitelisting
  • Audit logs & activity tracking
  • Data export & deletion
  • Custom data retention

Incident Response

  • 24/7 monitoring
  • Incident response plan
  • Breach notification process
  • Dedicated security team

Compliance & Certifications

  • SOC 2 Type II (in progress)
  • GDPR compliant
  • CCPA compliant
  • ISO 27001 (roadmap)

FAQ

  • Where is data stored?
  • Who can access my data?
  • How do you handle AI training?
  • Can I delete all my data?