Skip to content
Xplore
Trust · Security

Security posture.

Encryption, access control, infrastructure, and vulnerability management.

Encryption
In transit
TLS 1.2+ on all endpoints; HSTS enforced
At rest
AES-256 on databases and object storage
Secrets
KMS-backed; short-lived scoped credentials
Access control
Employee access
SSO + hardware key MFA required
Customer RBAC
Role-based access with least-privilege defaults
Audit logs
Append-only, immutable records
Infrastructure
Regions
EU + UK for production; pilot residency negotiable
Isolation
Per-tenant logical isolation; single-tenant option
Backups
Encrypted daily snapshots, 30-day retention
Vulnerability management
SCA
Automated on every PR
Pen-test
Third-party annual + pre-release
Disclosure
hello@xploreintelligence.co.uk (subject: Security disclosure); see /trust/responsible-disclosure