Authenticated APIs: All our APIs require an authentication token to be passed.
Multi-Factor Authentication: Checks for logical consistency and relevance.
Encryption: All customer data is encrypted in transit using TLS 1.2 and at rest using AES-256 encryption.
Code Analysis: We use tools to identify issues in our code and third party dependencies
Secure Development Policy: We peer review our code and bombard it with automated testing before you get to touch it.
Infrastructure Security: We utilize infrastructure-as-code techniques to securely and reliably deploy resources to our Azure tenant.