Trust & Security
Security atArchaeon
We build security software, so we hold ourselves to the highest standard. Here's how we protect your data and earn your trust.
“Your trust is our foundation. We implement defence-in-depth across every layer of our infrastructure — from encryption and access controls to continuous monitoring and incident response.”
How We Protect Your Data
Defence-in-depth across
every layer
Data Encryption
AES-256 encryption at rest and TLS for all data in transit. Customer-managed encryption keys available for enterprise plans, giving you full control over your cryptographic material.
Infrastructure Security
Hosted on SOC 2 Type II certified cloud infrastructure with network segmentation, web application firewalls, and DDoS protection at every edge. Immutable infrastructure deployed via automated pipelines.
Access Controls
Role-based access with the principle of least privilege enforced across all systems. Multi-factor authentication required, SSO support via SAML and OIDC, and comprehensive audit logs for every action.
Continuous Monitoring
24/7 infrastructure and application monitoring with real-time alerting. Automated vulnerability scanning on every deployment and regular third-party penetration testing.
Incident Response
Documented incident response plan with a 24-hour customer notification SLA. Post-incident reviews with root cause analysis shared transparently. Dedicated security team on call around the clock.
Secure Development
Security is embedded into every stage of our development lifecycle. Mandatory code reviews, automated static analysis, dependency scanning, and pre-deployment security checks ensure vulnerabilities are caught before they reach production.
Our Commitments
Promises we keep
We never sell or share your data with third parties
All employee devices are managed and encrypted
Background checks for all team members with data access
Regular security awareness training for every employee
Responsible disclosure program for security researchers
Questions?
Need more details?
Request our security whitepaper or speak directly with our security team. We're happy to answer any questions about how we protect your data.