Trust Center

Security

Enterprise-grade security built into every layer. Your safety data is protected by industry-leading practices and certifications.

SOC 2
Type II Certified
ISO
27001 Certified
GDPR
Compliant

Security Principles

Our security architecture is built on fundamental principles that protect your data at every stage.

Privacy by Design

Data minimization and privacy controls built into every feature from the ground up.

Zero Trust

Every request is authenticated and authorized, regardless of network location.

Defense in Depth

Multiple layers of security controls protect against various threat vectors.

Transparency

Clear documentation, audit logs, and regular security reports for customers.

Compliance & Certifications

GuardX maintains rigorous compliance standards verified by independent auditors.

SOC
Active

SOC 2 Type II

Annual audit of security, availability, processing integrity, confidentiality, and privacy controls.

Request report →
ISO
Active

ISO 27001

International standard for information security management systems (ISMS).

View certificate →
EU
Compliant

GDPR

Full compliance with EU General Data Protection Regulation requirements.

View DPA →
CA
Compliant

CCPA

California Consumer Privacy Act compliance for US customers.

Learn more →
HI
Available

HIPAA

BAA available for healthcare organizations handling protected health information.

Request BAA →
CSA
Level 2

CSA STAR

Cloud Security Alliance STAR Level 2 attestation for cloud security.

View registry →

Data Protection

Your data is protected with enterprise-grade encryption and security controls at every layer.

Encryption

In Transit
TLS 1.3 for all data transmission. Certificate pinning for mobile apps. Perfect forward secrecy enabled.
At Rest
AES-256 encryption for all stored data. Customer-managed keys (BYOK) available for enterprise.
Key Management
HSM-backed key storage. Automatic key rotation. Separate keys per customer.

Access Controls

Authentication
SSO with SAML 2.0 and OIDC. Multi-factor authentication required. Passwordless options available.
Authorization
Role-based access control (RBAC). Granular permissions per resource. Attribute-based policies (ABAC).
Audit Logging
Complete audit trail. Immutable logs. Real-time SIEM integration. 1-year retention minimum.

Infrastructure Security

Our cloud infrastructure is designed for security, reliability, and global scale.

Cloud Providers

Hosted on AWS, Azure, and GCP with SOC 2 and ISO 27001 certified data centers.

Global Network

Multi-region deployment with automatic failover. DDoS protection at edge.

Data Isolation

Logical tenant isolation. Dedicated instances available for enterprise customers.

Backup & Recovery

Automated daily backups. Point-in-time recovery. Cross-region replication.

Vulnerability Management

Continuous scanning. Automated patching. 24-hour critical vulnerability SLA.

Penetration Testing

Annual third-party pen tests. Continuous bug bounty program. Results available on request.

Privacy First

GuardX is designed with privacy at its core. We process safety data without compromising personal privacy.

No facial recognition or biometric identification
On-premise processing keeps video data local
Customer data is never shared or sold
Configurable data retention policies
Data deletion on request with verification
Privacy impact assessments for new features
Privacy Controls
Face Blurring
Automatically blur faces in recordings
Local Processing
Process all video on-premise
Metadata Only
Send only analytics to cloud
Auto-Delete
Delete footage after 30 days

Security Operations

Our dedicated security team monitors and responds to threats around the clock.

Monitoring & Detection

  • 24/7 Security Operations Center (SOC)
  • SIEM with ML-based anomaly detection
  • Real-time threat intelligence feeds
  • Automated response playbooks

Incident Response

  • Documented IR procedures (NIST aligned)
  • 1-hour initial response SLA
  • Customer notification within 24 hours
  • Post-incident review and lessons learned

Trust Resources

Download security documentation and compliance reports.

Security Questions?

Our security team is available to answer questions and provide additional documentation for your review.