We take security seriously. Learn about our approach to protecting your data and applications.
Our infrastructure and processes are audited annually to ensure compliance with SOC 2 standards.
All data is encrypted using AES-256 at rest and TLS 1.3 in transit.
Multiple layers of firewalls, DDoS protection, and intrusion detection systems protect our infrastructure.
Daily automated backups with point-in-time recovery capabilities ensure your data is never lost.
Each project operates in an isolated database schema with dedicated resources.
Fine-grained access control at the database level ensures users can only access their own data.
Our platform is designed to help you comply with global data protection regulations.
Choose where your data is stored with multiple region options for compliance requirements.
Secure your account with SMS, authenticator apps, or hardware security keys.
Granular permissions for team members with custom roles and access policies.
Secure authentication tokens with configurable expiration and rotation policies.
Create, rotate, and revoke API keys with granular permissions and usage tracking.
Our security program includes regular penetration testing, vulnerability scanning, and code reviews. We maintain a security incident response plan and conduct regular training for our team.
We encourage responsible disclosure of security vulnerabilities. If you believe you've found a security issue, please contact us at security@hirall.com.