🛡️ Enterprise Security
Security Overview
How we protect your data and ensure platform security
Our Security Commitment
Tablestakes AI is built with enterprise-grade security controls designed to protect your sensitive sales data. We implement industry best practices and maintain SOC2 compliance readiness to ensure your information remains secure.
🔒 Key Security Features
- Argon2 Password Hashing: Memory-hard algorithm resistant to GPU-based attacks
- 30-Minute Session Timeout: Automatic logout after inactivity
- HTTPS Encryption: All data transmitted over secure, encrypted connections
- Comprehensive Audit Logging: All user actions tracked with IP and timestamp
- CSRF Protection: Protection against cross-site request forgery attacks
- Automated Backups: Daily database backups with 7-day retention
Data Protection
Access Control
Each user's data is isolated and protected through user-specific database queries. All access requires authentication with secure email-based registration.
Network Security
- HTTPS enforcement with automatic HTTP to HTTPS redirects
- HSTS (HTTP Strict Transport Security) headers with 1-year duration
- Content Security Policy (CSP) preventing XSS attacks
- X-Frame-Options preventing clickjacking attacks
- Secure cookie configuration (HttpOnly, Secure, SameSite)
Audit & Monitoring
All security-relevant events are logged to our audit system, including:
- Login attempts (successful and failed)
- Account creation
- AI response generation
- Data saves and deletions
- User logout events
Security Best Practices
- Use Strong Passwords: Create unique passwords with a mix of characters
- Don't Share Credentials: Keep your login information confidential
- Log Out When Done: Always log out when finished, especially on shared devices
- Report Issues: Contact support immediately if you notice suspicious activity
Compliance & Certifications
Tablestakes AI maintains SOC2 compliance readiness with implemented controls for:
- Logical access controls (CC6.1)
- User authentication (CC6.2)
- Network communications (CC6.3)
- System monitoring (CC7.2)
- System availability (CC9.1)
View SOC2 Compliance Details
Back to Home