Security & System Status

Our approach to security, reliability, and the current health of core services.

Security Practices

  • Data at rest encrypted with AES-256; TLS 1.3 in transit.
  • Hardened Linux hosts, MFA for production access, IP allowlists.
  • Role-based access control, least-privilege, periodic reviews.
  • 24×7 monitoring, alerting, backups, and tested disaster recovery.
  • Routine vulnerability scans and independent security assessments.

Compliance

We align our controls with recognized industry standards and best practices. Documentation available to customers under NDA upon request.

Current Status

API & Core Services
operational
Realtime & WebSocket
operational
File Storage (S3/MinIO)
operational
Database Cluster
operational

Last checked: 11/11/2025, 5:29:04 PM

Report an Issue

If you notice anomalies or security concerns, contact our team:
📧 security@nexalith.com