TintenAI logoTinten AI
Security

Your data is protected by design

We build our infrastructure on zero-trust principles and encrypt information end to end.

Last updated: April 2026

1.Encryption

Sensitive data is protected with modern encryption algorithms, both in transit and at rest.

  • TLS 1.3 in transit.
  • AES-256 at rest.
  • Key rotation and HSM-backed key management.

2.Identity and access

We apply defence in depth to keep accounts secure.

  • Optional two-factor authentication (2FA).
  • Enterprise single sign-on via OAuth 2.0 / OpenID Connect.
  • Role-based authorization in the admin panel.

3.Infrastructure

Our production environment runs on a monitored, backed-up and controlled network.

  • Isolated networks on SOC 2 compliant cloud providers.
  • Automated backups and disaster-recovery playbooks.
  • Independent security audits and penetration tests.

4.Incident management

In the event of a security incident, transparent and rapid communication is the rule.

  • 24/7 incident response team.
  • Notification to affected users within 72 hours.
  • Detailed post-mortem reports published after an incident.

Report a vulnerability

If you have discovered a potential security vulnerability, disclose it to us responsibly. Our response time is 72 hours.

security@tinten.ai
Security | TintenAI