Security & Trust Center

Security at the Core

Built on trust, secured by design. We protect your data with enterprise-grade security measures, comprehensive compliance frameworks, and transparent practices.

Comprehensive Security Framework

Multi-layered security controls protect your data at every level

Data Protection

  • TLS 1.2+ encryption for data in transit
  • AES-256 encryption for data at rest
  • Individual encryption keys per document
  • RSA-4096 for secure data transfers

Access Control

  • Single Sign-On (SSO) via OpenID/SAML
  • Multi-factor authentication (MFA)
  • Role-based access control (RBAC)
  • Continuous access rights verification

Infrastructure Security

  • Multi-regional system distribution
  • High availability architecture
  • Continuous system monitoring
  • Automated threat detection

Certifications & Compliance

Meeting and exceeding international security standards

ISO/IEC 27001
ISAE 3402
GDPR
eIDAS
PSD2

Information Security Management

ISO/IEC 27001 aligned controls with comprehensive ISMS implementation

Assurance on Controls

ISAE 3402 attestation for security, availability, and confidentiality

Data Protection & Privacy

Full GDPR compliance with privacy-by-design architecture

Electronic Identity & Signatures

eIDAS qualified trust service provider for QES solutions

Security Operations

Proactive security measures and continuous improvement

Testing & Assurance

Regular security assessments ensure our defenses remain robust

1
Quarterly penetration testing by certified professionals
2
Continuous vulnerability scanning and assessment
3
Automated security testing in CI/CD pipeline
4
Third-party security audits and certifications

Incident Response

24/7 monitoring and rapid response to security events

1
Real-time security monitoring and alerting
2
Dedicated security operations center (SOC)
3
Incident response team with <1hr response time
4
Post-incident analysis and continuous improvement

Secure Development

Security integrated throughout our development lifecycle

1
Secure code reviews and peer assessments
2
Dependency scanning and management
3
Static and dynamic security testing (SAST/DAST)
4
Secrets management with automated rotation

Personnel Security

Ensuring our team maintains the highest security standards

1
Comprehensive background checks for all employees
2
Mandatory security awareness training
3
Strict confidentiality agreements and NDAs
4
Regular compliance and security certifications

Data Residency & Privacy

Your data stays where you need it, protected by comprehensive privacy controls

EU Data Residency

  • All data processing within EU boundaries
  • Multi-region availability within Europe
  • Customer-defined data residency options
  • No data transfers outside designated regions

Privacy Controls

  • Purpose limitation and data minimization
  • Automated retention and deletion policies
  • Full data subject rights implementation
  • DPA and sub-processor management

Vulnerability Disclosure Program

Help us maintain security by responsibly reporting vulnerabilities

How to Report

If you believe you have found a security vulnerability in our systems, please email [email protected] with details. We will acknowledge receipt within 3 business days and provide regular updates on our investigation.

Safe Harbor Policy

  • Do not access or modify data that does not belong to you
  • Avoid service disruption or degradation
  • Do not exfiltrate data beyond what's necessary for the proof of concept
  • Acting in good faith will not result in legal action

Scope & Guidelines

In Scope

  • Production systems and applications
  • API endpoints and integrations
  • Authentication and authorization systems

Please Include

  • Steps to reproduce the issue
  • Impact assessment
  • Proof of concept (if applicable)

We appreciate responsible disclosure and will coordinate with you on remediation timelines.

Report Vulnerability

Security Resources

Documentation and reports for security professionals

Security Whitepaper

Detailed technical overview of our security architecture

Penetration Test Reports

Latest third-party security assessment summaries

ISAE 3402 Report

Independent attestation of our security controls

Have Security Questions?

Our security team is here to help. Whether you need detailed documentation, have compliance requirements, or want to report a security issue, we're ready to assist.