Enterprise-Grade Security
Your legacy information is protected with bank-level security measures
End-to-End Encryption
All data is encrypted with AES-256 encryption at rest and TLS 1.3 in transit, ensuring your information remains private and secure.
Secure Data Storage
Your files are stored in geographically distributed data centers with automatic backups and redundancy to prevent data loss.
Authentication & Access Control
Secure authentication with password hashing and strict access controls ensure only authorized users can access your data.
Privacy by Design
We never sell your data. Your information is used solely to provide our services and is never shared with third parties without consent.
Infrastructure Security
Hosted on Supabase with AWS-backed infrastructure, featuring DDoS protection, firewalls, and intrusion detection systems.
Regular Security Audits
We conduct regular security assessments, penetration testing, and vulnerability scans to maintain the highest security standards.
Our Security Commitments
GDPR & CCPA Compliant
We comply with international data protection regulations including GDPR and CCPA, giving you control over your personal information.
SOC 2 Type II Standards
Our infrastructure partners maintain SOC 2 Type II compliance, ensuring robust security controls and processes.
24/7 Monitoring
Our systems are monitored around the clock for suspicious activity, with automated alerts and incident response procedures.
Secure Development Practices
Our development team follows secure coding practices with regular code reviews and automated security testing.
Data Residency Options
Your data is stored in secure, tier-certified data centers with options for geographic data residency preferences.
Employee Training
All team members undergo regular security training and follow strict access control policies.
Technical Security Details
Encryption
- • AES-256 encryption for data at rest
- • TLS 1.3 for data in transit
- • Encrypted database backups
- • Secure key management (AWS KMS)
Authentication
- • bcrypt password hashing
- • Secure session management
- • JWT-based authentication tokens
- • Protection against brute force attacks
Infrastructure
- • Supabase (PostgreSQL + AWS)
- • Distributed CDN for performance
- • Automated failover systems
- • DDoS protection and rate limiting
Application Security
- • Row-level security (RLS) policies
- • Input validation and sanitization
- • SQL injection prevention
- • XSS and CSRF protection
Security Concerns?
If you discover a security vulnerability, please report it to our security team immediately.
Report Security Issue