Security You Can Trust
We take security seriously. Our platform is built on enterprise-grade infrastructure with multiple layers of protection to keep your data and API communications secure.
Platform Security
Multiple layers of security protect your data and API communications
Encryption in Transit
All API communications are encrypted using TLS 1.2+ (HTTPS). We enforce secure connections and reject unencrypted requests.
- TLS 1.2 and 1.3 supported
- HSTS enabled
- Strong cipher suites only
Encryption at Rest
Data stored on our platform is encrypted using AES-256 encryption. API keys are hashed and never stored in plain text.
- AES-256-GCM encryption
- Automatic key rotation
- Secure key management
API Authentication
Secure API key authentication with support for key rotation, scoped permissions, and usage monitoring.
- Unique API keys per account
- Key regeneration on demand
- Usage analytics and alerts
Rate Limiting & DDoS Protection
Built-in rate limiting protects against abuse. Google Cloud's infrastructure provides DDoS mitigation at the edge.
- Per-key rate limits
- Burst allowances
- Automatic threat blocking
Audit Logging
Comprehensive logging of API access and administrative actions for security monitoring and compliance.
- Request logging
- Access audit trails
- Anomaly detection
Access Controls
Role-based access controls for team accounts. Principle of least privilege applied across our infrastructure.
- Team member roles
- Scoped API keys
- SSO support (Enterprise)
Infrastructure Security
Built on Google Cloud's secure, globally distributed infrastructure
Google Cloud Platform
Our entire infrastructure runs on Google Cloud, benefiting from their world-class security and compliance certifications.
Isolated Compute
APIs run in isolated containers with no shared resources between customers. Each request is processed in a secure sandbox.
Network Security
Virtual private cloud with strict firewall rules. Internal services are not exposed to the public internet.
Redundancy
Multi-region deployment with automatic failover. Your API calls are routed to the nearest healthy endpoint.
Compliance & Certifications
Working toward industry-standard compliance certifications
SOC 2 Type II
In ProgressWe are actively working toward SOC 2 Type II certification.
GDPR
CompliantWe comply with GDPR requirements for data protection and privacy.
CCPA
CompliantWe honor California Consumer Privacy Act data rights.
Google Cloud
CertifiedBuilt on Google Cloud's SOC 1/2/3, ISO 27001 certified infrastructure.
Data Handling
Transparency about how we handle your data
What data do you store?
We store your account information, API keys (hashed), and usage metrics. We do not store the content of your API requests or responses beyond what's needed for real-time processing.
How long is data retained?
Usage logs are retained for 90 days for analytics and debugging purposes. You can request deletion of your account data at any time by contacting us.
Do you sell or share data?
No. We never sell your data or share it with third parties for marketing purposes. Data is only used to provide and improve our services.
Where is data processed?
All data is processed on Google Cloud infrastructure. Primary processing occurs in US regions, with edge caching globally for performance.
For more details, see our Privacy Policy and Terms of Service.
Security Vulnerability Reporting
Found a security vulnerability? We appreciate responsible disclosure. Please report security issues through our contact page.
Report a VulnerabilityQuestions About Security?
Our team is happy to discuss our security practices and answer any questions about protecting your data.