Security at EkaVox
Your security is our top priority. We implement industry-leading practices to protect your data, code, and intellectual property.
Encryption at Rest
All data is encrypted using AES-256 encryption. Your code, designs, and personal information are protected even when stored.
Encryption in Transit
All communications use TLS 1.3 encryption. Data is protected as it travels between your browser and our servers.
Secure API Keys
Your API keys for Gemini, OpenAI, and other services are encrypted and stored securely. They are never exposed in logs or to other users.
Access Controls
Fine-grained permissions let you control who can access your projects. Role-based access for team collaboration.
Audit Logging
Comprehensive audit logs track all actions in your account. Know who did what and when for compliance and security.
Vulnerability Scanning
Regular security scans and penetration testing ensure our infrastructure remains secure against emerging threats.
Compliance & Certifications
SOC 2 Type II
Service Organization Control audit for security, availability, and confidentiality.
GDPR
Full compliance with EU General Data Protection Regulation.
CCPA
California Consumer Privacy Act compliance for US users.
ISO 27001
International standard for information security management.
Our Security Practices
- Regular security training for all employees
- Background checks for team members with data access
- Principle of least privilege for system access
- Multi-factor authentication required for all staff
- Regular third-party security audits
- Bug bounty program for responsible disclosure
- Incident response plan with 24/7 coverage
- Regular backup and disaster recovery testing
Report a Vulnerability
We take security seriously and appreciate responsible disclosure. If you discover a security vulnerability, please report it to us.
Available on requestQuestions About Security?
Our security team is happy to answer any questions about our security practices, compliance, or how we protect your data.
Contact Security Team