Transactional

Security

Security is at the core of everything we build. Learn about our practices and commitments.

Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.

Infrastructure

Hosted on SOC 2 compliant cloud infrastructure with multi-region redundancy.

Access Control

Role-based access control, multi-factor authentication, and API key rotation.

Monitoring

24/7 security monitoring, intrusion detection, and real-time alerting.

Compliance

GDPR, SOC 2 Type II, and ISO 27001 compliant. Regular third-party audits.

Incident Response

Documented incident response procedures with 24-hour notification commitment.

Security Practices

Data Protection

We take the security of your data seriously. All customer data is encrypted both in transit and at rest. We use industry-standard encryption protocols and regularly rotate encryption keys.

Infrastructure Security

Our infrastructure is hosted on enterprise-grade cloud providers with SOC 2 Type II certification. We implement defense-in-depth strategies including firewalls, network segmentation, and DDoS protection.

Application Security

  • Regular penetration testing by third-party security firms
  • Automated vulnerability scanning in CI/CD pipelines
  • Secure development practices and code review
  • Dependency vulnerability monitoring

Employee Security

  • Background checks for all employees
  • Security awareness training
  • Principle of least privilege access
  • Mandatory multi-factor authentication

Reporting Security Issues

If you discover a security vulnerability, please report it responsibly to security@usetransactional.com. We appreciate your help in keeping our platform secure and will acknowledge your contribution.

Security Updates

We maintain a security changelog and notify customers of any security incidents or updates that may affect their use of our services. For critical updates, we provide advance notice and migration guidance.