Security at the Core
Your data's safety is our top priority. We've built enterprise-grade security into every layer of the Samelogic platform, so you can build with confidence.
Compliance & Certifications
We adhere to strict security standards to ensure your data is protected. Our commitment to compliance is demonstrated through rigorous third-party audits and certifications.
SOC 2 Type II
Currently in progress. We are working with auditors to demonstrate our security controls.
GDPR Compliance
Fully compliant with GDPR regulations for data protection and privacy.
Service Organization Control 2
In ProgressWe are currently undergoing our SOC 2 Type II audit. This certification validates our controls for security, availability, and confidentiality.
Bank-Grade Infrastructure
We use the same infrastructure providers as the world's leading financial institutions to ensure your data is safe, available, and resilient.
Cloud Infrastructure
Hosted on Amazon Web Services (AWS), leveraging world-class physical and network security.
Encryption at Rest
All data is encrypted at rest using AES-256 standards to ensure it remains secure on disk.
Network Isolation
Services run in isolated Virtual Private Clouds (VPCs) with strict firewall rules and access controls.
DDoS Protection
Comprehensive protection against Distributed Denial of Service attacks using AWS Shield.
TLS 1.2+ Encryption
All data in transit is encrypted using Transport Layer Security (TLS) 1.2 or higher.
Key Management
Encryption keys are managed via AWS KMS with strict rotation policies and audit logging.
Access Logging
Every access to sensitive data is logged, monitored, and audited for suspicious activity.
Data Protection & Privacy
We treat your data as if it were our own. Our comprehensive data protection strategy ensures that your intellectual property and customer data remain private and secure.
- Strict logical separation of customer data
- Regular automated backups and disaster recovery testing
- Data retention policies compliant with GDPR
- Automatic PII redaction in logs and captures
Access Control & Authentication
Role-Based Access
Granular permissions ensure team members only access what they need to do their job.
Team Management
Centralized control over team membership, invitations, and access revocation.
Secure Sessions
Short-lived session tokens and secure cookie handling prevent session hijacking.
Vulnerability Reporting
We take security seriously. If you believe you've found a security issue in our platform, please contact our security team immediately. We appreciate your help in keeping Samelogic secure.
Report a Vulnerability