BetterData Logo

Security at BetterData

We implement industry-leading security controls to protect your data and ensure the highest levels of security.

Security at a glance:

• Encryption at rest and in transit

• Role-based access control (RBAC)

• Comprehensive audit logs

• Infrastructure security and monitoring

Security Controls

Encryption at Rest
implemented

All data is encrypted at rest using AES-256 encryption.

Encryption in Transit
implemented

All data in transit is encrypted using TLS 1.3.

Access Control
implemented

Role-based access control (RBAC) with least privilege principles.

Audit Logging
implemented

Comprehensive audit logs for all system access and changes.

Multi-Factor Authentication
implemented

MFA required for all administrative access.

Vulnerability Management
implemented

Regular vulnerability scanning and patch management.

Incident Response
implemented

Documented incident response procedures and team.

Security Training
implemented

Regular security awareness training for all employees.

Penetration Testing
implemented

Annual third-party penetration testing.

Security Monitoring
implemented

24/7 security monitoring and alerting.

Report a Vulnerability

Report a Vulnerability

We take security seriously and appreciate responsible disclosure of security vulnerabilities.

How to Report

If you discover a security vulnerability, please report it to security@betterdata.co

Response SLA:

  • Initial acknowledgment: 24 hours
  • Status update: 3 business days
  • Resolution timeline: Depends on severity (typically 30-90 days)

What to Include:

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact
  • Suggested fix (if any)

For more details, see our security.txt file.