Security at Dexify
Security is built into Dexify's architecture and processes. We protect customer data with layered controls, monitoring, and review.
Infrastructure
Hosted on hardened cloud infrastructure with network segmentation and restricted access.
Encryption
Data is encrypted in transit (TLS 1.2+) and at rest. Secrets are stored in managed secret stores.
Access controls
Least privilege and MFA enforced for internal tools. Production access is restricted and audited.
Document handling
- Processing uses time-limited storage; artifacts are removed after tasks complete.
- Isolated processing paths reduce cross-tenant risk.
- Logging captures actions, not document contents.
Monitoring & incident response
- 24/7 monitoring with alerts on availability, performance, and security events.
- Documented incident playbooks; customer notification for material events.
- Post-incident reviews with remediation tracking.
Backups & continuity
- Regular backups of critical metadata with tested restores.
- Redundant infrastructure across zones.
Responsible disclosure
We welcome security researchers to report vulnerabilities to security@dexify.app. We acknowledge reports promptly and provide timelines for fixes.