Plexflo encrypts data at rest and in transit for all of our customers. We use tools like Amazon Web Service’s Key Management System (KMS) to manage encryption keys using hardware security modules for maximum security in line with industry best practices.
Plexflo regularly engages some of the industry’s best application security experts for third-party penetration tests. Our penetration testers evaluate the source code, running application, and the deployed environment.
Plexflo also uses high-quality static analysis tooling provided by GitHub Advanced Security such as CodeQL, Secrets Scanner, and Dependabot to secure our product at every step of the development process.
Plexflo uses Amazon Web Services to host our application. We make full use of the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector.
In addition, we deploy our application using containers run on AWS managed services, meaning we typically do not manage servers or EC2 instances in production.
Data security is a top priority for Plexflo, and Plexflo believes that working with skilled security researchers can identify weaknesses in any technology. If you believe you’ve found a security vulnerability in Plexflo's service, please notify us; we will work with you to resolve the issue promptly.
Plexflo is providing this service to help ensure a safe and secure environment for all of its users. As such, any users believed to be engaging in the below activities will have their user credentials immediately deactivated.
While researching, we’d like you to refrain from:
This policy applies to the Plexflo Application hosted at app.plexflo.com and to any other subdomains or services associated with the Plexflo App. We do not accept reports for vulnerabilities solely affecting our marketing website (www.plexflo.com) which contains no sensitive data.
Thank you for helping to keep Plexflo and our users safe!
Plexflo is always open to feedback, questions, and suggestions. If you would like to talk to us, please feel free to email us at email@example.com
SOC 2 Type I and Type II.