← Back to homepage

Security

Last updated: May 2026

Our customers' data security is at the core of the product. We run on modern cloud infrastructure, with encryption at every layer, automatic backups, and strict access controls.

1. Encryption

2. Customer Isolation (Multi-tenancy)

Every customer receives a dedicated PostgreSQL schema with full isolation. There is no shared data between customers. Queries run against a fixed search_path scoped to the tenant's schema, with defense-in-depth tenant_id enforcement on every row.

3. Backups and Recovery

4. Access Control

5. Monitoring and Logs

6. Compliance and Standards

GDPR-aware Privacy Protection Law (Israel) TLS 1.3 AES-256 SOC 2-aligned

We comply with the principles of the Privacy Protection Law (Israel) and GDPR. Our guidelines for handling customer data are documented in our Data Processing Addendum.

7. Security Incident Reporting

If you discover a security vulnerability, please report it by email to [email protected]. We commit to an initial response within 48 hours and to remediation of critical vulnerabilities within 7 days.

8. Bug Bounty Program

We plan to launch a formal bug bounty program soon. In the meantime, responsible security researchers will receive public credits and symbolic rewards.

9. Service Termination

When a trial or subscription is cancelled, your data is retained for an additional 30 days in a closed state (for recovery purposes), and then permanently deleted. You can export everything to a JSON file from the dashboard before deletion.

10. Questions?

Our security team is available at [email protected] or via WhatsApp.