Security First

Your trust is our foundation. We implement enterprise-grade security measures to protect your data and ensure reliable disaster monitoring.

Infrastructure SLA: 99.9%

Backed by enterprise infrastructure with 99.9% uptime SLA, redundant systems, and 24/7 monitoring for critical safety alerts.

End-to-End Encryption

All data encrypted in transit and at rest using industry-standard AES-256 encryption and TLS 1.3.

Security Best Practices

Enterprise-grade security controls and regular audits meeting industry standards for data protection.

Security Architecture

Infrastructure Security

Multi-Region Deployment

Distributed across multiple data centers for redundancy and disaster recovery

Container Security

Docker containers with security scanning and minimal attack surfaces

Network Isolation

Private networks with firewall protection and intrusion detection

Automated Backups

Encrypted backups with point-in-time recovery and geographic distribution

Data Protection

Encryption at Rest

AES-256 encryption for all stored data including databases and file systems

Encryption in Transit

TLS 1.3 for all API communications and data transfers

On-Device Encryption

Auth credentials and personal data encrypted locally on your device using AES-GCM-256, protecting against malware and unauthorized access

Key Management

Hardware security modules (HSMs) and regular key rotation, plus non-extractable device encryption keys for local storage

Data Minimization

Only collect and store data essential for service delivery

Authentication & Access Control

User Authentication

  • Dual authentication: Magic link (trials) + password (paid accounts)
  • Phone verification (SMS) for trial signup abuse prevention
  • Bcrypt password hashing (cost factor 12) for paid accounts
  • JWT tokens with short expiration (15 min) and secure refresh
  • Auth tokens encrypted on-device — never stored as plaintext
  • Account lockout after 5 failed login attempts (15 min cooldown)
  • Session management with device tracking and revocation

Access Control

  • Role-based permissions (Basic, Pro, Family, Enterprise)
  • Principle of least privilege for all access
  • API rate limiting and abuse prevention
  • Session management with automatic timeout
  • Multi-factor authentication (coming soon)

Mobile App Security

iOS Security

  • • App Transport Security (ATS) compliance
  • • Keychain Services for secure credential storage
  • • On-device AES-GCM-256 encryption for stored credentials and personal data
  • • Certificate pinning for API communications
  • • Biometric authentication support
  • • App sandboxing and data protection
  • • Regular security updates through App Store

Android Security

  • • Android Keystore for secure key management
  • • On-device AES-GCM-256 encryption for stored credentials and personal data
  • • Network security configuration
  • • ProGuard code obfuscation
  • • Runtime Application Self-Protection (RASP)
  • • Android App Bundle security features
  • • Google Play Protect integration

On-Device Data Protection

Your Data is Encrypted on Your Device

Military-grade encryption protects your personal information locally

Beyond encrypting data in transit and on our servers, Keryx Maps encrypts your sensitive information directly on your device. This means even if your device is compromised, your personal data remains protected.

What's Encrypted on Your Device

  • Login credentials and authentication tokens
  • Your saved pins and waypoints
  • Emergency destinations and route history
  • Vehicle profiles and personal preferences

How It Works

  • A unique encryption key is generated on your device and never leaves it
  • AES-GCM-256 encryption — the same standard used by banks and governments
  • The encryption key is non-extractable — it cannot be read or exported, even by other apps
  • Encryption and decryption happen instantly — no impact on app performance

Why This Matters

Most apps store your login tokens and personal data as plain text on your device. If malware or an unauthorized user gains access to your device's storage, they can steal your credentials and personal information. With Keryx Maps, all sensitive data is encrypted using a hardware-backed key that cannot be extracted — even with direct access to the device's file system, your data remains unreadable.

Monitoring & Incident Response

24/7 Monitoring

  • • Real-time security event detection
  • • Automated threat response systems
  • • Performance and availability monitoring
  • • Anomaly detection and alerting

Incident Response

  • • Dedicated security response team
  • • Incident escalation procedures
  • • Forensic analysis capabilities
  • • User notification protocols

Audit Logging

  • • Comprehensive activity logs
  • • Tamper-evident log storage
  • • Compliance reporting
  • • Long-term log retention

Compliance & Certifications

Security First

Enterprise-Grade Protection

Industry-standard security controls, regular audits, and best practices for data protection and privacy.

View Privacy Policy →

GDPR Compliant

European Data Protection

Full compliance with European Union General Data Protection Regulation with comprehensive user rights and controls.

Privacy Policy →

ISO 27001

Information Security Management

CCPA

California Privacy Rights

NIST

Cybersecurity Framework

OWASP

Security Best Practices

Security Performance

99.9%

Infrastructure SLA

Enterprise hosting uptime

<30s

Alert Speed

Critical notification delivery

24/7

Monitoring

Continuous security oversight

0

Data Breaches

Perfect security record

Your Security Matters

Best Practices for Users

  • Use a strong, unique password for your account
  • Enable biometric authentication on mobile devices
  • Keep your mobile app updated to the latest version
  • Log out from shared or public devices
  • Report suspicious activity immediately

Our Ongoing Commitment

  • Regular security audits and penetration testing
  • Continuous monitoring and threat intelligence
  • Investment in the latest security technologies
  • Security team training and certification
  • Transparent communication about security updates

Report Security Issues

If you discover a security vulnerability or have concerns about our security practices, please report them responsibly. We take all security reports seriously and will investigate promptly.

Security Email

security@keryxmaps.com

Response Time

Within 24 hours

We appreciate responsible disclosure and will acknowledge all legitimate security reports.

Built for Trust

Security isn't just a feature—it's the foundation of everything we do. When disasters strike, you need to trust that your safety system is secure, reliable, and always available.