Security & Trust
Our security controls, policies, procedures are documented and available 24/7 in our Trust Center.
Data & Application Security
Palosade is architected with a security-first approach, embedding industry best practices and enterprise-grade protections at every layer of the platform.
Tenant-Level Data Isolation. Each customer’s data is securely isolated to prevent cross-tenant access.
Encryption at Rest. All stored data is encrypted using strong AES-256 standards, safeguarding against unauthorized access—even in the event of a breach.
Encryption in Transit. End-to-end TLS protection with strong AES-256 block cipher cryptography to maintain confidentiality and integrity across networks.
Application Hardening. The platform is continuously hardened against modern attack vectors through secure coding, rigorous testing, and layered defenses.
Infrastructure security
Palosade’s infrastructure is hosted on the world-class AWS Cloud, leveraging its industry-leading security framework and scalable architecture. AWS delivers enterprise-grade protection to ensure all your data, files, and information remain secure within its trusted data centers.
Compliance
We are actively pursuing SOC 2 Type II certification, covering the trust criteria of Security, Confidentiality, and Availability. We are committed to the highest standards of data protection and privacy.
Continued investment in advanced processes, technology, and expertise ensures that our systems uphold rigorous safeguards. Security remains a top priority in everything we build and deliver.
Single sign on (SSO)
With SSO, you can seamlessly sign in using your Google Workspace or Microsoft credentials—enhancing security by removing the need to create, manage, or store separate passwords for Palosade services.
Vulnerability Disclosure
We value the contributions of the security research community and recognize the importance of a coordinated approach to vulnerability disclosure. If you have discovered a security vulnerability, we encourage you to let us know immediately. We welcome the opportunity to work with you to resolve the issue promptly.
Adhering to industry standards is important to us, and our program is covered by Coordinated Vulnerability Disclosure, Safe Harbor, Open Scope and Core Ineligible Findings, and Detailed Platform Standards.
Submit your vulnerability disclosure via our HackerOne form here.
Discover Palosade
Automate your security program and unleash your business potential with Palosade