Security
Your data is protected by design
We build our infrastructure on zero-trust principles and encrypt information end to end.
Last updated: April 2026
1.Encryption
Sensitive data is protected with modern encryption algorithms, both in transit and at rest.
- TLS 1.3 in transit.
- AES-256 at rest.
- Key rotation and HSM-backed key management.
2.Identity and access
We apply defence in depth to keep accounts secure.
- Optional two-factor authentication (2FA).
- Enterprise single sign-on via OAuth 2.0 / OpenID Connect.
- Role-based authorization in the admin panel.
3.Infrastructure
Our production environment runs on a monitored, backed-up and controlled network.
- Isolated networks on SOC 2 compliant cloud providers.
- Automated backups and disaster-recovery playbooks.
- Independent security audits and penetration tests.
4.Incident management
In the event of a security incident, transparent and rapid communication is the rule.
- 24/7 incident response team.
- Notification to affected users within 72 hours.
- Detailed post-mortem reports published after an incident.
Report a vulnerability
If you have discovered a potential security vulnerability, disclose it to us responsibly. Our response time is 72 hours.
security@tinten.ai
