1. Security program
OrgAxis follows layered security practices covering application, infrastructure, access, and operational controls. Security is reviewed continuously as part of product development and release processes.
2. Infrastructure security
- Hosted on trusted cloud infrastructure providers with enterprise-grade controls.
- Network protection with segmentation, firewall controls, and hardened services.
- Regular patching and maintenance for systems and dependencies.
3. Access control
Access to production systems is limited to authorized personnel based on role and business need. Access is reviewed periodically and revoked when no longer required.
4. Encryption
Data in transit is protected using TLS. Sensitive data at rest is protected using encryption mechanisms provided by our infrastructure and application-level controls where applicable.
5. Monitoring and response
We maintain logging, alerting, and operational monitoring to detect and respond to suspicious activity. Security incidents are investigated with defined escalation and remediation processes.
6. Availability and backups
We maintain data backup and recovery mechanisms to support service continuity. Platform performance and uptime are monitored to reduce disruption risk.
7. Responsible disclosure
If you identify a potential vulnerability, please report it responsibly to our security team. We review reports promptly and work to validate and address confirmed issues.
8. Contact us
For security-related questions or vulnerability reports, contact security@orgaxis.com or use Contact Sales.