Security

How we protect your data at every layer

Encryption

All data is encrypted at rest using AES-256 and in transit using TLS 1.3. Database connections are encrypted end-to-end. Encryption keys are managed via a dedicated key management service.

Access Control

Role-based access control (RBAC) ensures users only see what they need. Multi-factor authentication available for all accounts. Session management with automatic timeouts and audit logging.

Infrastructure

Hosted on enterprise-grade infrastructure with redundant storage and automatic backups. On-premise and private cloud deployment options available for clients with strict data residency requirements.

Compliance

Our security practices align with SOC 2 Type II and GDPR standards. HIPAA-compliant configurations available for healthcare clients. Regular third-party security audits and penetration testing.

Audit Logging

Every data access, transformation, and export is logged with timestamps and user attribution. Audit logs are immutable and retained for a minimum of 12 months. Available for export on request.

Incident Response

Documented incident response procedures with defined escalation paths. Automated threat detection and alerting. We commit to notifying affected clients within 72 hours of any confirmed security incident.

Security Questions?

Our team is happy to discuss security requirements specific to your organisation, provide compliance documentation, or arrange a security review call.