Security Safeguards

Last updated April 2, 2026

At Agiled, security is fundamental to everything we build. We understand that you trust us with sensitive business data — client information, financial records, contracts, and more. This page describes the measures we take to keep that data safe.

Infrastructure Security

Hosting and Data Centers

  • Agiled is hosted on enterprise-grade cloud infrastructure with SOC 2 Type II certified data centers
  • Our infrastructure providers maintain physical security controls including biometric access, 24/7 surveillance, and environmental controls
  • We use geographically distributed systems for redundancy and disaster recovery

Network Security

  • All network traffic is monitored for suspicious activity and potential threats
  • We employ firewalls, intrusion detection systems, and DDoS protection
  • Network access is segmented and restricted based on the principle of least privilege

Data Encryption

In Transit

  • All data transmitted between your browser and Agiled is encrypted using TLS 1.2 or higher
  • We enforce HTTPS across all endpoints with HSTS (HTTP Strict Transport Security)
  • API communications are secured with the same encryption standards

At Rest

  • All stored data is encrypted using AES-256 encryption
  • Database backups are encrypted and stored in secure, access-controlled locations
  • Encryption keys are managed using industry-standard key management practices

Application Security

Secure Development

  • We follow secure coding practices throughout our software development lifecycle
  • Code changes undergo peer review before deployment
  • We conduct regular security testing, including static analysis and dynamic application security testing
  • Dependencies are regularly audited and updated to address known vulnerabilities

Authentication and Access Control

  • Passwords are hashed using bcrypt with appropriate cost factors
  • Support for strong password policies and session management
  • Role-based access controls allow organizations to manage permissions granularly
  • Administrative access to production systems requires multi-factor authentication

Data Isolation

  • Each organization's data is logically isolated from other organizations
  • Strict access controls ensure users can only access data within their organization
  • API requests are authenticated and authorized on every call

Operational Security

Monitoring and Incident Response

  • 24/7 infrastructure monitoring with automated alerting for anomalies
  • Defined incident response procedures with clear escalation paths
  • Regular security drills and tabletop exercises
  • Post-incident reviews to continuously improve our response capabilities

Backup and Recovery

  • Automated daily backups with point-in-time recovery capability
  • Backups are encrypted and stored in geographically separate locations
  • Regular backup restoration tests to verify data integrity
  • Documented disaster recovery plan with defined recovery time objectives

Employee Access

  • Employee access to customer data is restricted to authorized personnel who require it for their role
  • All access is logged and auditable
  • Employees undergo security awareness training
  • Background checks are conducted for employees with access to sensitive systems

Compliance

  • Our practices are designed to support compliance with GDPR, CCPA, and other applicable data protection regulations
  • We maintain a Data Processing Agreement for customers who require one
  • Regular internal audits of our security controls and practices
  • We work with independent security professionals to assess our security posture

Vulnerability Disclosure

If you discover a security vulnerability in Agiled, we encourage you to report it responsibly. Please contact us at security@agiled.app with details of the vulnerability. We take all reports seriously and will respond promptly.

Questions

For security-related questions or concerns, please contact our team at security@agiled.app.