Security & Privacy
Your security is our top priority
Modern architecture designed with security by design principles, featuring security controls at every level of your infrastructure
TLS 1.3 Encryption
Secure communications
2FA Available
Two-factor authentication
GDPR Compliant
Data protection
Protection Measures
Our in-depth approach to protecting your data and infrastructure
Infrastructure & Encryption
End-to-end encryption
TLS 1.3 for all communications, modern encryption algorithms for data at rest, and systematic CSRF protection
- TLS 1.3 for all communications
- Secure cookies with HttpOnly and SameSite flags
- CSRF protection on all requests
Resilient infrastructure
Encrypted automatic backups, high availability, disaster recovery plan, and geographic isolation
- Daily encrypted automatic backups
- High availability with replication
- Tested disaster recovery plan
Authentication & Access
Enhanced authentication
Two-factor authentication (2FA), automatic compromised password checking, and secure Argon2 hashing
- Two-factor authentication (2FA)
- Secure Argon2 hashing
- Compromised password checking
Granular access control
Role-based permissions, strict multi-tenant isolation, and complete audit log of all sensitive actions
- Granular role-based permissions
- Strict multi-tenant isolation
- Complete audit log
Monitoring and alerts
Automatic suspicious activity detection, real-time alerts on critical actions, and continuous security monitoring
- Automatic suspicious activity detection
- Real-time alerts
- Continuous security monitoring
Privacy Protection
We respect your privacy and commit to handling your data responsibly and transparently
Full GDPR compliance
Architecture designed with privacy by design principles. Consent management, automatic IP anonymization, right to erasure, and complete data export
Total transparency
Detailed and accessible privacy policy, complete access to your activity log, and proactive incident communication
User control
You maintain full control over your data: view, export, modify and delete at any time through your dashboard
Proactive security
Regular security audits, penetration testing, active vulnerability monitoring, and priority security updates
Enterprise Features
Advanced features for demanding teams and organizations
IP Whitelisting
Restrict access to your projects from authorized IP addresses only
Audit export
Complete audit log export in CSV/JSON for compliance and external analysis
Single Sign-On (SSO)
Integration with Google Workspace, Microsoft 365, Okta and other SAML providers
Priority support
Dedicated team, guaranteed SLA, and 24/7 security assistance
Security question?
Our team is available to answer all your questions regarding the security and privacy of your data
Is your application really secure?
75% of critical bugs go unnoticed without professional monitoring.