Security
Your data security is our top priority. Learn about the measures we take to protect your information.
Our Security Commitment
We implement industry-leading security practices to protect your data and ensure the safety of our platform.
Data Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption to ensure your information remains secure.
Secure Infrastructure
Our infrastructure is hosted on dedicated servers with enterprise-grade security, including regular security audits and penetration testing.
Access Controls
Multi-factor authentication, role-based access controls, and session management ensure only authorized users can access your data.
Security Measures
Authentication & Authorization
- Multi-factor authentication (MFA)
- Single sign-on (SSO) integration
- Role-based access controls
- Session timeout and management
- Password policies and requirements
Data Protection
- End-to-end encryption
- Regular data backups
- Data retention policies
- Secure data deletion
- GDPR compliance
Network Security
- DDoS protection
- Web application firewall (WAF)
- Intrusion detection systems
- Regular security monitoring
- 24/7 security operations
Compliance & Certifications
GDPR Compliance
Full compliance with the General Data Protection Regulation for EU users.
PDPA Compliance
Full compliance with the Personal Data Protection Act for Thai/Singapore users.
Enterprise Ready
Meets enterprise security requirements and can, on request, be deployed in private environments.
Security Best Practices
How we maintain the highest security standards
Regular Security Audits
We conduct comprehensive security audits and penetration testing on a regular basis to identify and address potential vulnerabilities.
Continuous Monitoring
Our security team monitors our systems 24/7 to detect and respond to any security threats in real-time.
Security Training
All team members receive regular security training to ensure they follow best practices and stay updated on emerging threats.
Vulnerability Management
We maintain a comprehensive vulnerability management program to quickly identify and patch security issues.
Incident Response
Our commitment to transparency and rapid response
Detection
Automated monitoring systems detect potential security incidents
Assessment
Security team assesses the incident and determines severity
Response
Immediate action is taken to contain and resolve the incident
Communication
Affected users are notified promptly with detailed information
Security Questions?
Our security team is here to help
If you have security concerns or need more information about our security practices, please contact our security team: