Enterprise Security

Your data security is our priority

Built with enterprise-grade security from day one. SOC 2 Type II certified, GDPR compliant, and trusted by security-conscious organizations worldwide.

Certifications & Compliance

SOC 2 Type II

Annual third-party audit of security, availability, and confidentiality controls

GDPR Compliant

Full compliance with EU data protection regulations

CCPA Compliant

Meets California Consumer Privacy Act requirements

ISO 27001

Information security management certification (in progress)

Security Features

Multiple layers of protection to keep your data safe

Data Encryption

  • AES-256 encryption at rest
  • TLS 1.3 encryption in transit
  • End-to-end encryption for sensitive data
  • Encrypted backups with secure key management

Access Control

  • Role-based access control (RBAC)
  • Multi-factor authentication (MFA)
  • Single Sign-On (SSO) support
  • Session management and automatic timeout

Infrastructure

  • AWS infrastructure with 99.99% uptime SLA
  • Multi-region data replication
  • DDoS protection
  • Web Application Firewall (WAF)

Monitoring

  • 24/7 security monitoring
  • Real-time threat detection
  • Comprehensive audit logging
  • Automated vulnerability scanning

Anonymous Feedback Protection

When feedback is configured as anonymous, we go to extraordinary lengths to protect reviewer identities. This isn't just a feature—it's a fundamental commitment.

  • Cryptographically separated from feedback content
  • Aggregation prevents identification in small teams
  • No backdoors or de-anonymization tools exist
  • Anonymity survives data exports and deletion
  • Regular third-party audits of anonymity controls

Trust is Everything

Employees must trust that their honest feedback won't come back to haunt them. We've designed our system so that even our own engineers cannot identify anonymous reviewers.

Security Best Practices

Security isn't just about technology—it's about people and processes

Secure Development

All code undergoes peer review, static analysis, and vulnerability testing before deployment.

Regular Penetration Testing

Third-party security experts conduct annual penetration tests to identify vulnerabilities.

Employee Security Training

All employees complete security awareness training and background checks.

Incident Response

Documented incident response procedures with 72-hour breach notification commitment.

Vendor Security

All third-party vendors undergo security assessment before integration.

Data Minimization

We only collect data necessary for providing our services.

Cloud Infrastructure

Perfo Review runs on Amazon Web Services (AWS) infrastructure, leveraging their industry-leading security capabilities.

99.99%

Uptime SLA

3+

Availability Zones

Daily

Encrypted Backups

Have Security Questions?

Our security team is happy to answer your questions, complete security questionnaires, or schedule a security review call.