Security & Compliance

Your supply chain data is critical. We build security into every layer of the platform.

Infrastructure Security

  • Hosted on AWS with multi-AZ redundancy
  • Encryption at rest (AES-256) and in transit (TLS 1.3)
  • Multi-tenant data isolation at the database level
  • Automated backups with point-in-time recovery

Application Security

  • Role-based access control (RBAC) with customizable permissions
  • Full audit logging of all user actions
  • API key management with scoped permissions
  • SSO integration (SAML, OIDC) for Enterprise plans

Compliance

  • SOC 2 Type II compliance path
  • GDPR-ready data handling practices
  • Regular third-party security assessments

Have security questions?

Our team is happy to walk through our security practices in detail.

Contact Us