Security Practices
Data Protection
We take the security of your data seriously. All customer data is encrypted both in transit and at rest. We use industry-standard encryption protocols and regularly rotate encryption keys.
Infrastructure Security
Our infrastructure is hosted on enterprise-grade cloud providers with SOC 2 Type II certification. We implement defense-in-depth strategies including firewalls, network segmentation, and DDoS protection.
Application Security
- Regular penetration testing by third-party security firms
- Automated vulnerability scanning in CI/CD pipelines
- Secure development practices and code review
- Dependency vulnerability monitoring
Employee Security
- Background checks for all employees
- Security awareness training
- Principle of least privilege access
- Mandatory multi-factor authentication
Reporting Security Issues
If you discover a security vulnerability, please report it responsibly to security@usetransactional.com. We appreciate your help in keeping our platform secure and will acknowledge your contribution.
Security Updates
We maintain a security changelog and notify customers of any security incidents or updates that may affect their use of our services. For critical updates, we provide advance notice and migration guidance.