Security at Perfect10

Last Updated: December 12, 2024

Our Security Principles

We apply industry-leading security practices to safeguard customer data and maintain platform integrity. Our approach is built on the following core principles:

Defense in Depth

Multiple overlapping layers of protection.

Zero Trust

Never assume trust—validate every request.

Least Privilege

Access is limited to exactly what’s required.

Security by Design

Security is integrated into every layer from day one.

Your Data Is Protected By

  • TLS 1.3 encryption in transit
  • AES-256 encryption at rest
  • Multi-factor authentication (MFA)
  • 24/7 monitoring and automated alerting
  • Daily encrypted backups
  • Regular independent penetration testing
  • SOC 2 & ISO 27001 compliance work in progress

Found a Vulnerability?

We welcome responsible disclosure. If you'd like to report a security issue, email us at:

security@perfect10.com

Security Policy • Version 1.0 • Effective December 12, 2024