Security
Learn about Notika’s security measures and data protection practices
Notika takes security seriously. We maintain strict security protocols and perform regular audits to protect your data.
Security features
Our platform features end-to-end encryption, read-only database access, and regular security audits with no data storage outside of processing.
Compliance
We maintain regular penetration testing and a security bug bounty program. GDPR and SOC 2 compliance coming soon.
Overview
Notika implements multiple layers of security to protect your data and ensure the safety of your notification workflows. Our founding team brings extensive security and engineering experience from companies like Netflix, Google, and Stanford, with a combined 20+ years of software engineering expertise.
Database security
We provide read-only access by default, double-encrypted credentials, scoped permissions, and SSL/TLS encrypted connections.
Infrastructure
Our platform includes managed hosting, DDoS protection, intrusion detection, and automated vulnerability scanning.
Key security features
Infrastructure security
Our infrastructure is built with security in mind:
Network security
Multiple layers of firewalls, network segregation, and DDoS protection
Encryption
TLS/HTTPS for all connections and AES-256 encryption for data at rest
Access controls
Principle of least privilege with role-based permissions and 2FA
Monitoring
24/7 infrastructure and security monitoring with intrusion detection
Reporting security issues
If you believe you’ve found a security vulnerability, please report it immediately.
Contact our security team:
- Email: [email protected]
- Response time: Within 24 hours
- Bug bounty program available for eligible reports
Was this page helpful?