Skip to main content
All CollectionsPrivacy and Security
How secure is my data on Solatis?
How secure is my data on Solatis?
D
Written by David Michel
Updated over a month ago

Solatis implements enterprise-grade security measures to ensure the confidentiality, integrity, and availability of your data. Our comprehensive security framework includes end-to-end encryption for all data both in transit (using TLS 1.3 protocols) and at rest (using AES-256 encryption). The platform is built on a zero-trust architecture that requires continuous verification regardless of whether the access request originates from inside or outside the network perimeter. We conduct regular penetration testing and security audits by independent third parties to identify and address potential vulnerabilities before they can be exploited. Solatis complies with international security standards including SOC 2 Type II, ISO 27001, and adheres to privacy regulations like GDPR and CCPA. Our data centers feature physical security controls, redundant systems, and disaster recovery protocols to ensure business continuity. For enterprise clients, we offer additional security features such as single sign-on (SSO), multi-factor authentication (MFA), and role-based access controls (RBAC) that allow granular permission management. You maintain complete control over your data, including the ability to export or permanently delete it at any time, with verified deletion processes that ensure your information is completely removed from our systems when requested.

Did this answer your question?