Security at Perfect10
Last Updated: December 12, 2024
Our Security Principles
We apply industry-leading security practices to safeguard customer data and maintain platform integrity. Our approach is built on the following core principles:
Defense in Depth
Multiple overlapping layers of protection.
Zero Trust
Never assume trust—validate every request.
Least Privilege
Access is limited to exactly what’s required.
Security by Design
Security is integrated into every layer from day one.
Your Data Is Protected By
- TLS 1.3 encryption in transit
- AES-256 encryption at rest
- Multi-factor authentication (MFA)
- 24/7 monitoring and automated alerting
- Daily encrypted backups
- Regular independent penetration testing
- SOC 2 & ISO 27001 compliance work in progress
Found a Vulnerability?
We welcome responsible disclosure. If you'd like to report a security issue, email us at:
security@perfect10.com