// Trust & Safety

Security at Vrelix

Your data's security is foundational to everything we build. We apply zero-trust principles across every layer of our infrastructure.

🔐

Encryption

All data encrypted at rest (AES-256) and in transit (TLS 1.3+). Encryption keys managed via HSMs.

🛡️

Zero-Trust Access

Every request is authenticated and authorized. No implicit trust — least-privilege access enforced throughout.

🔍

Continuous Monitoring

24/7 threat detection, automated anomaly alerting, and a dedicated security operations center.

Compliance & Certifications

Vrelix maintains the following certifications and compliance frameworks:

SOC 2 Type II
ISO 27001
HIPAA Ready
GDPR Compliant
CCPA Compliant

Infrastructure Security

Data Isolation

Enterprise customers benefit from dedicated infrastructure options. Your data is never used to train models without explicit consent. Tenant data is logically and physically isolated at all times.

Vulnerability Disclosure

We operate a responsible disclosure program. If you discover a security vulnerability, please report it to [email protected]. We aim to acknowledge reports within 24 hours and resolve critical issues within 72 hours.

Employee Security