Security

Built for sensitive information from the ground up.

Encryption

  • Data encrypted at rest using AES-256
  • Data encrypted in transit using TLS 1.3
  • Encryption keys managed per tenant

Role-based access control

  • Granular permission model
  • Organisation-level role definitions
  • Audit logging of access events

Tenant isolation

  • Complete data separation between organisations
  • Isolated processing environments
  • No cross-tenant data access

Authentication

  • Multi-factor authentication support
  • SSO integration available
  • Session management controls

Compliance readiness

Architecture designed to support regulatory requirements. Audit trails maintained for all data access and processing operations.