Security & System Status
Our approach to security, reliability, and the current health of core services.
Security Practices
- Data at rest encrypted with AES-256; TLS 1.3 in transit.
- Hardened Linux hosts, MFA for production access, IP allowlists.
- Role-based access control, least-privilege, periodic reviews.
- 24×7 monitoring, alerting, backups, and tested disaster recovery.
- Routine vulnerability scans and independent security assessments.
Compliance
We align our controls with recognized industry standards and best practices. Documentation available to customers under NDA upon request.
Current Status
API & Core Services
operational
Realtime & WebSocket
operational
File Storage (S3/MinIO)
operational
Database Cluster
operational
Last checked: 11/11/2025, 5:29:04 PM
Report an Issue
If you notice anomalies or security concerns, contact our team:
📧 security@nexalith.com