Cookie Policy

Cookie Policy

How we protect your data

Infrastructure Security

Infrastructure Security

Our platform is hosted on enterprise-grade cloud infrastructure with SOC 2 Type II compliance. All data is encrypted at rest using AES-256 encryption and in transit using TLS 1.3. Our infrastructure is distributed across multiple availability zones for redundancy.

Our platform is hosted on enterprise-grade cloud infrastructure with SOC 2 Type II compliance. All data is encrypted at rest using AES-256 encryption and in transit using TLS 1.3. Our infrastructure is distributed across multiple availability zones for redundancy.

Application Security

Application Security

We follow secure development practices including regular code reviews, automated vulnerability scanning, and penetration testing by third-party security firms. Our application undergoes continuous monitoring for threats and anomalies.

We follow secure development practices including regular code reviews, automated vulnerability scanning, and penetration testing by third-party security firms. Our application undergoes continuous monitoring for threats and anomalies.

Access Controls

Access Controls

We implement role-based access controls, multi-factor authentication, and the principle of least privilege across our organization. All employee access to production systems is logged and audited regularly.

We implement role-based access controls, multi-factor authentication, and the principle of least privilege across our organization. All employee access to production systems is logged and audited regularly.

Data Protection

Data Protection

Customer data is logically isolated and encrypted. We perform daily automated backups with point-in-time recovery capabilities. Backup data is encrypted and stored in geographically separate locations.

Customer data is logically isolated and encrypted. We perform daily automated backups with point-in-time recovery capabilities. Backup data is encrypted and stored in geographically separate locations.

Incident Response

Incident Response

We maintain a comprehensive incident response plan with defined escalation procedures. In the event of a security incident, affected customers will be notified within 72 hours in accordance with applicable regulations.

We maintain a comprehensive incident response plan with defined escalation procedures. In the event of a security incident, affected customers will be notified within 72 hours in accordance with applicable regulations.

Compliance

Compliance

Nexus is SOC 2 Type II certified, GDPR compliant, and CCPA compliant. We undergo annual third-party audits to verify our security controls and practices.

Nexus is SOC 2 Type II certified, GDPR compliant, and CCPA compliant. We undergo annual third-party audits to verify our security controls and practices.

Responsible Disclosure

Responsible Disclosure

We welcome security researchers to report vulnerabilities through our responsible disclosure program. Please report any security concerns to security@nexus.com.

We welcome security researchers to report vulnerabilities through our responsible disclosure program. Please report any security concerns to security@nexus.com.

Create a free website with Framer, the website builder loved by startups, designers and agencies.