NEWConduyt v3 is live: native email + SMS campaigns, now with flow-based automation.See what's new →

Security first, always

Your data is the most valuable asset you have. We treat it that way — encrypted, isolated, and audited at every layer.

SOC 2 Type IIGDPR CompliantHIPAA ReadyCCPA CompliantISO 27001
AES

Encryption at Rest

All data encrypted with AES-256 at rest. Database volumes, backups, and file storage are encrypted end-to-end.

TLS

Encryption in Transit

TLS 1.3 enforced on every connection. HSTS preloaded, certificate transparency monitored.

RLS

Row-Level Security

Multi-tenant isolation via Postgres row-level security. Your data is never accessible to other accounts.

2FA

Multi-Factor Auth

TOTP and WebAuthn supported. Session tokens rotate automatically and expire after inactivity.

WAF

Web Application Firewall

Rate limiting, bot detection, and DDoS mitigation at the edge. Automated threat intelligence feeds.

LOG

Audit Logging

Every API call, login, and data mutation is logged with actor, timestamp, and IP. Exportable and queryable.

BKP

Automated Backups

Point-in-time recovery with 30-day retention. Cross-region replication for disaster recovery.

PEN

Penetration Testing

Annual third-party pen tests by certified firms. Continuous vulnerability scanning on every deployment.

VLT

Secrets Management

No secrets in code. All credentials stored in encrypted vaults with automatic rotation policies.

Request our SOC 2 report

We're happy to share our latest SOC 2 Type II report and security questionnaire responses under NDA.

Request Report