Security
Keeping our customer data safe and secure is our highest priority. We take threats very seriously and work hard to protect our customers and their data.
Comments and Requests
To make a request or report an issue with Hydrolix, please contact us using our security issue report form.
Vulnerability Disclosure
If you would like to report a vulnerability or have a security concern, please contact us using our security issue report form.
Include a proof of concept, a list of tools used, and the output of your process. Once received, we verify each vulnerability and take necessary steps to fix it. Once verified, we periodically send status updates as problems are fixed.
Security Techniques
Hydrolix uses industry standard techniques to secure your data from unauthorized access.
Infrastructure and Network Security
Hydrolix runs on cloud infrastructure including Amazon Web Services (AWS), Google Cloud Platform (GCP), and Linode. These platforms follow industry standard security techniques, including:
• access control
• network monitoring and protection
• physical access control
Penetration Testing
Hydrolix performs penetration testing via a third party on a regular basis.
Data Segregation
Customer data is deployed exclusively on customer cloud resources. This means that customer data never mixes.