How We Protect Your Data

Security

We protect the people who protect others. Security isn't just our product category — it's how we build everything.

🔐

Encryption at Rest & In Transit

All data is encrypted with AES-256 at rest and TLS 1.3 in transit. Database fields containing PII use application-level encryption with tenant-isolated keys.

🏗️

Tenant Isolation

Row-level security policies ensure complete data isolation between tenants. Every database query is automatically scoped to the authenticated tenant.

🔑

Authentication & Access Control

Argon2id password hashing, JWT-based sessions with automatic rotation, role-based access control with 7 permission levels, and optional two-factor authentication.

🛡️

Infrastructure Security

Hosted on hardened Linux servers with automated security patching, containerized application architecture, network segmentation, and continuous monitoring.

📋

Audit Logging

Comprehensive audit trail for all user actions, data changes, and access events. Logs are immutable and retained for 12 months minimum.

🔄

Backup & Recovery

Automated daily backups with point-in-time recovery capability. Backups are encrypted and stored in geographically separate locations with 30-day retention.

Ready to upgrade your security operations?

Join security companies across the country running on Perimeter OS.