Security is architecture, not a feature

Tenant-isolated by default, audit-traced from day one, and operated under documented response procedures. We design security in, not bolt it on.

Encryption

Customer data is encrypted at rest and in transit using industry-standard algorithms.

Access Control

Role-based access controls, least-privilege defaults, and multi-factor authentication for administrative roles.

Infrastructure

Environment separation between production, staging, and development, with continuous monitoring of application and security events.

Audit Logging

Application and security events are logged to support incident review. Retention and access follow the Security Notice.

Data Segregation

Customer data is logically segregated by tenant. Access is mediated by server-side policies, not client trust.

Incident Response

Documented response procedures and a direct security contact for responsible disclosure and customer incident notification.

Honest status. No overclaiming.

Compliance is a posture, not a badge. Here's where we are today, and what's next on the roadmap.

Compliance roadmap — honest status

We don't claim certifications we don't hold. Here's exactly where we are.

  • CCPA

    Privacy controls active. Rights honored for California residents.

    Active
  • GDPR

    Privacy-by-design principles implemented. Data Processing Addendum available on request.

    Active
  • SOC 2 Type II

    Independent audit in preparation.

    In Preparation

Found something? Tell us directly.

We welcome coordinated disclosure from security researchers. If you believe you've discovered a vulnerability, please contact our security team before public disclosure. We aim to acknowledge reports quickly and keep you updated as we remediate.

security[at]sentinelcxpro.comPGP key available on request
Now accepting briefings

See how your data is handled end to end.

Request a private briefing. 30 minutes. Your data, your locations, your questions — walked through by our team.

Request a Private Briefing
  • 30-minute walkthrough
  • Tailored to your locations
  • Your data stays yours