Your data is protected by industry-leading security practices and infrastructure.
We host on AWS with data centers across North America, Europe, and Asia Pacific. Our infrastructure is designed for high availability with automatic failover and redundancy across multiple availability zones.
All network traffic is encrypted and passes through our Web Application Firewall (WAF). We use DDoS protection, intrusion detection systems, and network segmentation to isolate sensitive systems.
We follow the principle of least privilege for all system access. Employee access is reviewed quarterly, and all production access requires MFA and is logged. Critical operations require approval from multiple team members.
We conduct regular security assessments including automated scanning, penetration testing, and third-party audits. Our bug bounty program rewards responsible disclosure of security vulnerabilities.
Found a security issue? We appreciate responsible disclosure.