Security First

Your trust is our foundation. We implement enterprise-grade security measures to protect your data and ensure reliable disaster monitoring.

Infrastructure SLA: 99.9%

Backed by enterprise infrastructure with 99.9% uptime SLA, redundant systems, and 24/7 monitoring for critical safety alerts.

End-to-End Encryption

All data encrypted in transit and at rest using industry-standard AES-256 encryption and TLS 1.3.

Security Best Practices

Enterprise-grade security controls and regular audits meeting industry standards for data protection.

Security Architecture

Infrastructure Security

Multi-Region Deployment

Distributed across multiple data centers for redundancy and disaster recovery

Container Security

Docker containers with security scanning and minimal attack surfaces

Network Isolation

Private networks with firewall protection and intrusion detection

Automated Backups

Encrypted backups with point-in-time recovery and geographic distribution

Data Protection

Encryption at Rest

AES-256 encryption for all stored data including databases and file systems

Encryption in Transit

TLS 1.3 for all API communications and data transfers

Key Management

Hardware security modules (HSMs) and regular key rotation

Data Minimization

Only collect and store data essential for service delivery

Authentication & Access Control

User Authentication

  • Dual authentication: Magic link (trials) + password (paid accounts)
  • Phone verification (SMS) for trial signup abuse prevention
  • Bcrypt password hashing (cost factor 12) for paid accounts
  • JWT tokens with short expiration (15 min) and secure refresh
  • Account lockout after 5 failed login attempts (15 min cooldown)
  • Session management with device tracking and revocation

Access Control

  • Role-based permissions (Basic, Pro, Family, Enterprise)
  • Principle of least privilege for all access
  • API rate limiting and abuse prevention
  • Session management with automatic timeout
  • Multi-factor authentication (coming soon)

Mobile App Security

iOS Security

  • • App Transport Security (ATS) compliance
  • • Keychain Services for secure credential storage
  • • Certificate pinning for API communications
  • • Biometric authentication support
  • • App sandboxing and data protection
  • • Regular security updates through App Store

Android Security

  • • Android Keystore for secure key management
  • • Network security configuration
  • • ProGuard code obfuscation
  • • Runtime Application Self-Protection (RASP)
  • • Android App Bundle security features
  • • Google Play Protect integration

Monitoring & Incident Response

24/7 Monitoring

  • • Real-time security event detection
  • • Automated threat response systems
  • • Performance and availability monitoring
  • • Anomaly detection and alerting

Incident Response

  • • Dedicated security response team
  • • Incident escalation procedures
  • • Forensic analysis capabilities
  • • User notification protocols

Audit Logging

  • • Comprehensive activity logs
  • • Tamper-evident log storage
  • • Compliance reporting
  • • Long-term log retention

Compliance & Certifications

Security First

Enterprise-Grade Protection

Industry-standard security controls, regular audits, and best practices for data protection and privacy.

View Privacy Policy →

GDPR Compliant

European Data Protection

Full compliance with European Union General Data Protection Regulation with comprehensive user rights and controls.

Privacy Policy →

ISO 27001

Information Security Management

CCPA

California Privacy Rights

NIST

Cybersecurity Framework

OWASP

Security Best Practices

Security Performance

99.9%

Infrastructure SLA

Enterprise hosting uptime

<30s

Alert Speed

Critical notification delivery

24/7

Monitoring

Continuous security oversight

0

Data Breaches

Perfect security record

Your Security Matters

Best Practices for Users

  • Use a strong, unique password for your account
  • Enable biometric authentication on mobile devices
  • Keep your mobile app updated to the latest version
  • Log out from shared or public devices
  • Report suspicious activity immediately

Our Ongoing Commitment

  • Regular security audits and penetration testing
  • Continuous monitoring and threat intelligence
  • Investment in the latest security technologies
  • Security team training and certification
  • Transparent communication about security updates

Report Security Issues

If you discover a security vulnerability or have concerns about our security practices, please report them responsibly. We take all security reports seriously and will investigate promptly.

Security Email

security@keryxmaps.com

Response Time

Within 24 hours

We appreciate responsible disclosure and will acknowledge all legitimate security reports.

Built for Trust

Security isn't just a feature—it's the foundation of everything we do. When disasters strike, you need to trust that your safety system is secure, reliable, and always available.