Security

Your data security is our top priority. Learn about the measures we take to protect your information.

Our Security Commitment

We implement industry-leading security practices to protect your data and ensure the safety of our platform.

Data Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption to ensure your information remains secure.

Secure Infrastructure

Our infrastructure is hosted on dedicated servers with enterprise-grade security, including regular security audits and penetration testing.

Access Controls

Multi-factor authentication, role-based access controls, and session management ensure only authorized users can access your data.

Security Measures

Authentication & Authorization
  • Multi-factor authentication (MFA)
  • Single sign-on (SSO) integration
  • Role-based access controls
  • Session timeout and management
  • Password policies and requirements
Data Protection
  • End-to-end encryption
  • Regular data backups
  • Data retention policies
  • Secure data deletion
  • GDPR compliance
Network Security
  • DDoS protection
  • Web application firewall (WAF)
  • Intrusion detection systems
  • Regular security monitoring
  • 24/7 security operations

Compliance & Certifications

GDPR Compliance

Full compliance with the General Data Protection Regulation for EU users.

PDPA Compliance

Full compliance with the Personal Data Protection Act for Thai/Singapore users.

Enterprise Ready

Meets enterprise security requirements and can, on request, be deployed in private environments.

Security Best Practices

How we maintain the highest security standards

Regular Security Audits

We conduct comprehensive security audits and penetration testing on a regular basis to identify and address potential vulnerabilities.

Continuous Monitoring

Our security team monitors our systems 24/7 to detect and respond to any security threats in real-time.

Security Training

All team members receive regular security training to ensure they follow best practices and stay updated on emerging threats.

Vulnerability Management

We maintain a comprehensive vulnerability management program to quickly identify and patch security issues.

Incident Response

Our commitment to transparency and rapid response

1
Detection

Automated monitoring systems detect potential security incidents

2
Assessment

Security team assesses the incident and determines severity

3
Response

Immediate action is taken to contain and resolve the incident

4
Communication

Affected users are notified promptly with detailed information

Security Questions?

Our security team is here to help

If you have security concerns or need more information about our security practices, please contact our security team: