Security Safeguards
Last updated April 2, 2026
At Agiled, security is fundamental to everything we build. We understand that you trust us with sensitive business data — client information, financial records, contracts, and more. This page describes the measures we take to keep that data safe.
Infrastructure Security
Hosting and Data Centers
- Agiled is hosted on enterprise-grade cloud infrastructure with SOC 2 Type II certified data centers
- Our infrastructure providers maintain physical security controls including biometric access, 24/7 surveillance, and environmental controls
- We use geographically distributed systems for redundancy and disaster recovery
Network Security
- All network traffic is monitored for suspicious activity and potential threats
- We employ firewalls, intrusion detection systems, and DDoS protection
- Network access is segmented and restricted based on the principle of least privilege
Data Encryption
In Transit
- All data transmitted between your browser and Agiled is encrypted using TLS 1.2 or higher
- We enforce HTTPS across all endpoints with HSTS (HTTP Strict Transport Security)
- API communications are secured with the same encryption standards
At Rest
- All stored data is encrypted using AES-256 encryption
- Database backups are encrypted and stored in secure, access-controlled locations
- Encryption keys are managed using industry-standard key management practices
Application Security
Secure Development
- We follow secure coding practices throughout our software development lifecycle
- Code changes undergo peer review before deployment
- We conduct regular security testing, including static analysis and dynamic application security testing
- Dependencies are regularly audited and updated to address known vulnerabilities
Authentication and Access Control
- Passwords are hashed using bcrypt with appropriate cost factors
- Support for strong password policies and session management
- Role-based access controls allow organizations to manage permissions granularly
- Administrative access to production systems requires multi-factor authentication
Data Isolation
- Each organization's data is logically isolated from other organizations
- Strict access controls ensure users can only access data within their organization
- API requests are authenticated and authorized on every call
Operational Security
Monitoring and Incident Response
- 24/7 infrastructure monitoring with automated alerting for anomalies
- Defined incident response procedures with clear escalation paths
- Regular security drills and tabletop exercises
- Post-incident reviews to continuously improve our response capabilities
Backup and Recovery
- Automated daily backups with point-in-time recovery capability
- Backups are encrypted and stored in geographically separate locations
- Regular backup restoration tests to verify data integrity
- Documented disaster recovery plan with defined recovery time objectives
Employee Access
- Employee access to customer data is restricted to authorized personnel who require it for their role
- All access is logged and auditable
- Employees undergo security awareness training
- Background checks are conducted for employees with access to sensitive systems
Compliance
- Our practices are designed to support compliance with GDPR, CCPA, and other applicable data protection regulations
- We maintain a Data Processing Agreement for customers who require one
- Regular internal audits of our security controls and practices
- We work with independent security professionals to assess our security posture
Vulnerability Disclosure
If you discover a security vulnerability in Agiled, we encourage you to report it responsibly. Please contact us at security@agiled.app with details of the vulnerability. We take all reports seriously and will respond promptly.
Questions
For security-related questions or concerns, please contact our team at security@agiled.app.