Security
Last updated: January 15, 2025
Your Security is Our Priority
Enterprise-grade security for businesses of all sizes
At Deelo, we understand that your business data is critical. That's why we've built our platform with security at its core, implementing industry-leading practices to protect your information.
Security Features
Encryption at Rest & in Transit
All data is encrypted using AES-256 encryption at rest and TLS 1.3 for data in transit.
SOC 2 Type II Compliant
Our infrastructure and processes are audited annually for security, availability, and confidentiality.
Multi-Factor Authentication
Protect your accounts with TOTP, SMS, or hardware security key authentication.
Comprehensive Audit Logs
Track all user activities with detailed audit logs and real-time monitoring.
Global Infrastructure
Data hosted in secure, geographically distributed data centers with 99.9% uptime SLA.
Role-Based Access Control
Granular permissions and access controls to ensure least-privilege access.
Infrastructure Security
Data Centers
Deelo's infrastructure is hosted across multiple tier-1 data center providers, including Google Cloud Platform and Amazon Web Services. Our data centers feature:
- 24/7 physical security with biometric access controls
- Redundant power supplies and cooling systems
- Fire detection and suppression systems
- Geographic redundancy for disaster recovery
- Regular third-party security assessments and penetration testing
Network Security
Our network infrastructure is protected by multiple layers of security:
- Web Application Firewalls (WAF) to protect against attacks
- DDoS mitigation and traffic filtering
- Intrusion detection and prevention systems (IDS/IPS)
- Regular vulnerability scanning and patching
- Network segmentation and micro-segmentation
Application Security
Secure Development Practices
Our engineering team follows secure coding practices and industry standards:
- OWASP Top 10 vulnerability prevention
- Mandatory code reviews for all changes
- Automated security testing in CI/CD pipelines
- Regular third-party penetration testing
- Bug bounty program for responsible disclosure
Authentication & Authorization
We provide robust authentication options to protect your accounts:
- Multi-factor authentication (MFA) with TOTP, SMS, or hardware keys
- Single Sign-On (SSO) with SAML 2.0 and OAuth 2.0/OIDC
- API key management with scoped permissions
- Session management with automatic timeout
- IP allowlisting for enhanced access control
Data Protection
Encryption
All data is encrypted to ensure confidentiality:
- In Transit: TLS 1.3 encryption for all data transfers
- At Rest: AES-256 encryption for stored data
- Backups: Encrypted backups with secure key management
- Database: Column-level encryption for sensitive fields
Data Isolation
Your data is logically isolated from other customers:
- Tenant isolation at the database level
- Separate encryption keys per organization
- Strict access controls and audit logging
Compliance & Certifications
SOC 2 Type II
Annual audit for security, availability, and confidentiality
GDPR Compliant
Full compliance with EU data protection regulations
CCPA Compliant
California Consumer Privacy Act compliance
HIPAA Ready
BAA available for healthcare organizations (Enterprise)
Incident Response
We maintain a comprehensive incident response plan to quickly address any security concerns:
- 24/7 security monitoring and alerting
- Defined incident classification and escalation procedures
- Regular incident response drills and tabletop exercises
- Post-incident analysis and lessons learned
- Customer notification within 72 hours of confirmed data breaches
Organizational Security
Employee Security
Our team members undergo thorough security training and background checks:
- Background checks for all employees
- Security awareness training upon hire and annually
- Principle of least privilege access
- Secure remote work policies and endpoint protection
- Regular phishing simulations and training
Vendor Management
We carefully vet all third-party vendors and partners:
- Security assessments before engagement
- Data processing agreements (DPAs) in place
- Regular review of vendor security posture
- Limited data sharing on a need-to-know basis
Report a Security Vulnerability
If you've discovered a security vulnerability in Deelo, please report it responsibly to our security team. We appreciate your help in keeping our platform secure.
security@deelo.aiQuestions?
If you have questions about our security practices or would like to request our SOC 2 report, please contact our security team at security@deelo.ai.