Security Policy

Security Policy

Learn about how we protect your data and systems

Encryption

All your data is protected with the highest security standards: • AES-256 bit encryption (data at rest) • TLS 1.3 encryption (data in transit) • End-to-end encryption options • Encrypted backups Encryption keys are stored in secure key management systems and rotated regularly.

Secure Infrastructure

Our infrastructure is designed with a security focus: • AWS and Google Cloud secure data centers • Multi-region redundancy • DDoS protection • Firewalls and isolation • Regular security updates All systems are monitored 24/7 and automated threat detection is performed.

Access Control

We apply strict access control policies: • Multi-factor authentication (MFA) • Role-based access control (RBAC) • Principle of least privilege • Regular access audits • Strong password policies All access attempts are logged and abnormal activities are detected.

24/7 Monitoring

Our systems are constantly monitored: • Real-time threat detection • Automated security alerts • Abnormal behavior analysis • Security event management (SIEM) • Regular security scans Our security team is ready 24/7 against potential threats.

Compliance and Certificates

We comply with international security standards: • SOC 2 Type II certified • GDPR compliant • ISO 27001 certified • KVKK compliant • PCI DSS standards Regular independent audits are performed and reports are shared with our customers.

Event Intervention

We are prepared for security events: • Intervention within 24 hours • Automated threat isolation • Detailed event analysis • Transparent communication • Corrective measures In case of security events, affected users are informed immediately.

Do You Have Security Concerns?

Contact our security team or report a security vulnerability

Contact Security Team