Your data security is our priority
Built with enterprise-grade security from day one. SOC 2 Type II certified, GDPR compliant, and trusted by security-conscious organizations worldwide.
Certifications & Compliance
SOC 2 Type II
Annual third-party audit of security, availability, and confidentiality controls
GDPR Compliant
Full compliance with EU data protection regulations
CCPA Compliant
Meets California Consumer Privacy Act requirements
ISO 27001
Information security management certification (in progress)
Security Features
Multiple layers of protection to keep your data safe
Data Encryption
- AES-256 encryption at rest
- TLS 1.3 encryption in transit
- End-to-end encryption for sensitive data
- Encrypted backups with secure key management
Access Control
- Role-based access control (RBAC)
- Multi-factor authentication (MFA)
- Single Sign-On (SSO) support
- Session management and automatic timeout
Infrastructure
- AWS infrastructure with 99.99% uptime SLA
- Multi-region data replication
- DDoS protection
- Web Application Firewall (WAF)
Monitoring
- 24/7 security monitoring
- Real-time threat detection
- Comprehensive audit logging
- Automated vulnerability scanning
Anonymous Feedback Protection
When feedback is configured as anonymous, we go to extraordinary lengths to protect reviewer identities. This isn't just a feature—it's a fundamental commitment.
- Cryptographically separated from feedback content
- Aggregation prevents identification in small teams
- No backdoors or de-anonymization tools exist
- Anonymity survives data exports and deletion
- Regular third-party audits of anonymity controls
Trust is Everything
Employees must trust that their honest feedback won't come back to haunt them. We've designed our system so that even our own engineers cannot identify anonymous reviewers.
Security Best Practices
Security isn't just about technology—it's about people and processes
Secure Development
All code undergoes peer review, static analysis, and vulnerability testing before deployment.
Regular Penetration Testing
Third-party security experts conduct annual penetration tests to identify vulnerabilities.
Employee Security Training
All employees complete security awareness training and background checks.
Incident Response
Documented incident response procedures with 72-hour breach notification commitment.
Vendor Security
All third-party vendors undergo security assessment before integration.
Data Minimization
We only collect data necessary for providing our services.
Cloud Infrastructure
Perfo Review runs on Amazon Web Services (AWS) infrastructure, leveraging their industry-leading security capabilities.
99.99%
Uptime SLA
3+
Availability Zones
Daily
Encrypted Backups
Have Security Questions?
Our security team is happy to answer your questions, complete security questionnaires, or schedule a security review call.