Security
How we protect your data and our infrastructure
Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption. Database connections are secured with SSL certificates.
Access Control
Role-based access control, multi-factor authentication, and principle of least privilege ensure only authorized personnel access sensitive systems.
Infrastructure Security
Our infrastructure runs in EU-based data centers with SOC 2 certification. Network segmentation, firewalls, and DDoS protection are in place.
Monitoring & Logging
24/7 security monitoring with intrusion detection, anomaly detection, and comprehensive audit logging of all system access.
Incident Response
Documented incident response procedures with defined escalation paths. Data breach notifications within 72 hours as required by GDPR.
Compliance
GDPR compliant. Regular security audits, penetration testing, and vulnerability assessments by independent third parties.
Responsible Disclosure
If you discover a security vulnerability, please report it to our security team. We appreciate responsible disclosure and will acknowledge your contribution.