edena
Book a Demoedena.io
  • Welcome to edena
  • Start Here
    • Analyze Your First Deal
  • About
    • How it Works
    • Security
    • FAQ
  • Vision
    • Why VCs Use edena
    • Roadmap
Powered by GitBook
On this page
  • Data Protection
  • Access Controls
  • Infrastructure Security
  • Compliance
  • Regular Monitoring and Updates
  • Your Responsibilities
  1. About

Security

Advanced tools require advanced security.

Data Protection

Encryption

  • In Transit: All data is encrypted using TLS/SSL (via HTTPS). No HTTP routes are permitted.

  • At Rest: Generated reports are currently stored as plain JSON with database-level encryption. Will be enforced with additional AES encryption in the future.

Secure API Communication

  • Interactions with external AI providers (e.g., OpenAI, Gemini, Anthropic) are conducted via their native SDKs. These SDKs are regularly updated and scanned for vulnerabilities, ensuring secure communication.

Access Controls

  • Role-Based Permissions: Granular control ensures only authorized users in your organization can view or manage specific data.

  • Session Management: Sessions are tracked using cookies, expiring after 1 hour. A refresh token system allows sessions to be extended for up to 7 days, but tokens can be revoked at any time. All settings are configurable.

Infrastructure Security

Server Protection

  • Hosting: edena is currently hosted on Replit, with Q3 plans to migrate to a cloud-based infrastructure compliant with ISO 27001 and SOC 2 standards.

  • Network Security: Firewalls, intrusion detection systems (IDS), and regular vulnerability scans are in place.

Data Isolation

  • User data is segregated by unique IDs, ensuring no cross-access between accounts.

Compliance

  • Regulatory Standards: We adhere to GDPR, CCPA, and other relevant data privacy regulations.

  • Privacy Policy: edena does not sell or share your data with third parties outside of the services required to deliver insights.

Regular Monitoring and Updates

  • Proactive Monitoring: Systems are continuously monitored for threats.

  • Patch Management: Security updates are applied promptly to address vulnerabilities.

Your Responsibilities

To help maintain a secure environment:

  • Use strong, unique passwords for your edena account.

  • Avoid sharing sensitive credentials or data over unsecured channels.

  • Keep your browser up to date to ensure it includes the latest security patches.

  • Avoid accessing edena on public or unsecured networks.

PreviousHow it WorksNextFAQ

Last updated 6 months ago