π Security & Trust
Enterprise-grade security for your most sensitive data
π 256-bit Encryption
π TLS 1.3
β
SOC 2 Type II
πͺπΊ GDPR Compliant
π‘οΈ ISO 27001
π 99.9% SLA
99.9%
Uptime SLA
24/7
Security Monitoring
<15min
Incident Response
Zero
Breaches (Ever)
π Data Security
Encryption
- At Rest: AES-256 encryption for all stored data
- In Transit: TLS 1.3 for all API and web traffic
- End-to-End: Client-side encryption available for sensitive data
- Key Management: Hardware Security Modules (HSM) for key storage
Zero-Knowledge Architecture
Optional zero-knowledge encryption means we never see your plaintext data. You control the keys.
- Client-side encryption before upload
- Server-side encrypted data processing
- Encrypted results storage
- You hold the decryption keys
Data Retention
- Analysis Results: 90 days (configurable up to 1 year for Enterprise)
- Uploaded Files: 30 days (immediately deletable by you)
- Audit Logs: 1 year (7 years for Enterprise)
- Account Data: Deleted within 30 days of account closure
π Compliance & Certifications
π‘οΈ SOC 2 Type II
Independently audited security controls for service organizations
Last Audit: January 2025
π ISO 27001
International standard for information security management
Certified: 2024
πͺπΊ GDPR Compliant
Full compliance with EU General Data Protection Regulation
DPA Available: Yes
πΊπΈ CCPA Compliant
California Consumer Privacy Act compliance
Privacy Rights: Fully Supported
π₯ HIPAA Ready
HIPAA-compliant infrastructure available for healthcare
BAA Available: Enterprise Plan
π³ PCI DSS
Payment Card Industry Data Security Standard
Level: Service Provider Level 1
ποΈ Infrastructure Security
Cloud Infrastructure
- Multi-region deployment (US-East, US-West, EU, APAC)
- Automated failover and disaster recovery
- Daily encrypted backups with 30-day retention
- Geo-redundant storage
Network Security
- WAF (Web Application Firewall) protection
- DDoS mitigation and traffic filtering
- Network segmentation and isolation
- Intrusion Detection System (IDS)
Application Security
- OWASP Top 10 protection
- Regular security audits and penetration testing
- Automated vulnerability scanning
- Secure Software Development Lifecycle (SSDLC)
- Dependency vulnerability monitoring
π€ Access Control & Authentication
Authentication
- Multi-Factor Authentication (MFA): TOTP, SMS, Hardware keys
- Single Sign-On (SSO): SAML 2.0, OAuth 2.0, OpenID Connect
- API Keys: Scoped permissions, automatic rotation
- Session Management: Secure, short-lived tokens
Authorization
- Role-Based Access Control (RBAC)
- Least-privilege principle enforcement
- Fine-grained API permissions
- Team and organization isolation
Audit Logging
- Comprehensive audit trail for all actions
- Real-time security event monitoring
- Tamper-proof log storage
- Export logs to your SIEM
π¨ Incident Response
24/7 Security Operations Center
Our dedicated security team monitors all systems around the clock.
- Real-time threat detection
- Automated incident response workflows
- 15-minute response time SLA for critical incidents
- Quarterly incident response drills
Vulnerability Management
- Continuous vulnerability scanning
- Responsible disclosure program
- Bug bounty program ($500 - $10,000 rewards)
- Patch SLA: Critical (24h), High (7 days), Medium (30 days)
Communication
- Transparent security notifications
- Status page: status.veribits.com
- Security mailing list for critical updates
- Annual security report published
π Privacy Commitment
Data Ownership
Your data is YOUR data. We never sell, rent, or share your data with third parties.
Data Processing
- We only process data necessary to provide the service
- No data mining or profiling for advertising
- Data segregation between customers
- Right to export all your data (portable format)
- Right to delete your data permanently
Transparency
- Clear, readable privacy policy (no legalese)
- Data Processing Agreement (DPA) available
- Subprocessor list publicly available
- Annual transparency report
π Service Level Agreement
Uptime Guarantee
| Plan |
Monthly Uptime |
Credits |
| Free |
Best effort |
N/A |
| Pro |
99.5% |
10% credit per 0.5% below |
| Enterprise |
99.9% |
25% credit per 0.1% below |
Support Response Times
| Severity |
Pro |
Enterprise |
| Critical |
4 hours |
1 hour |
| High |
1 business day |
4 hours |
| Normal |
2 business days |
1 business day |
π Security Resources
Report Security Issue
Found a vulnerability? We value responsible disclosure.
π§ Email: security@veribits.com
π PGP Key: Download
π° Bug Bounty: Learn More
Security Documentation
Contact Security Team
For security inquiries, compliance questions, or enterprise security requirements:
π§ security@veribits.com
Last Updated: January 28, 2025 β’ Version 2.0