Trust Center

Security & Privacy

Transparency and security standards are our core. We prioritize protecting customer data as much as protecting the infrastructure itself.

End-to-End Encryption

All data is highly encrypted both at rest and in transit.

Data Privacy by Design

The system is designed with privacy at its core. We only access data necessary for threat analysis.

Strict Access Control

Data access is controlled by strict Role-Based Access Control (RBAC)

How do we handle your data?

1. Data Collection

PLEASE-PROTECT SENSOR captures and collects only Logs, Network Traffic Meta-data, and Events necessary for detecting suspicious behavior. We do not collect Sensitive PII unrelated to the cybersecurity context.

2. Storage & Isolation

Each customer's data is strictly isolated (Tenant Isolation). Whether you choose Cloud-native or On-Premise, your data is protected with the highest security standards to prevent leaks and cross-system access.

3. Data Retention

We have a log retention policy that meets international standards and legal requirements. Customers can adjust the Data Retention period according to their organizational compliance. Data is securely destroyed upon expiration.

4. PDPA & Compliance

Our architecture and workflows are designed to comply with Personal Data Protection Acts (PDPA). We act as a transparent and auditable Data Processor at every step.

Have questions about our privacy policy or want to report a security issue? Please contact [email protected]