Security

You can trust us for your journey to the cloud

Data ownership

You own your data. All data you upload as well as any data that is generated by our tools is owned by you. We don't claim any ownership of any data connected to you.

End-to-end encryption

AES-256 encryption keeps your data safe at rest. Whenever data is transferred, TLS v1.2 is used to secure your data in transit.

Local analysis

None of the source code or data from your database leaves your machine. The source code analysis and the database analysis happen in your own environment. Only the generated data is uploaded.

We follow industry standards and best practices to keep your data safe

Secure secret storage

We never store secrets in plain text. All secrets are encrypted and stored following industry best practices for management of cryptographic secrets.

Regular security updates

We monitor all technologies used in our products and development cycle for updates and regularly deploy security patches and updated versions.

Controlled change management

All changes to production systems are made using state of the art software for infrastructure and application deployments, following the industry best practices related to infrastructure as code.

Principle of Least Privilege

We adamantly follow the idea of least privilege access across all of our production systems. This includes minimal fine grained access control at the authorization layer and fully minimized public facing network exposure.

Regular penetration testing

We regularly conduct vulnerability scans and penetration tests both during development and in production to identify potential security issues.

All your security questions answered

Get in Touch

Any other questions?

Ask Us