Enterprise-grade security

Your data security is our top priority

ProposalKit is built with security at every layer. From encryption to access controls, we protect your business data with industry-leading practices.

AES-256
Encryption Standard
TLS 1.3
Transport Security
99.9%
Uptime SLA
In Progress
SOC 2

How we protect your data

Multiple layers of security work together to keep your proposals, customer data, and business information safe.

AES-256 Encryption at Rest

All stored data — proposals, customer information, and signatures — is encrypted using AES-256, the same standard used by banks and government agencies.

TLS 1.3 In Transit

Every connection to ProposalKit is encrypted with TLS 1.3, ensuring your data is secure as it travels between your device and our servers.

In Progress

SOC 2 Compliance

We are actively pursuing SOC 2 Type II certification to independently verify our security controls, policies, and procedures meet industry standards.

Secure Data Centers

Our infrastructure is hosted on AWS with data centers that maintain physical security controls, redundant power, cooling systems, and 24/7 monitoring.

Access Controls

Multi-factor authentication, role-based permissions, and principle of least privilege ensure only authorized personnel can access sensitive systems and data.

Regular Audits

We conduct regular security audits, penetration testing, and vulnerability assessments to proactively identify and address potential threats.

Incident Response

Prepared for anything

In the unlikely event of a security incident, our response team follows a documented, tested incident response plan to minimize impact and maintain transparency.

  • 24/7 automated monitoring and alerting
  • Documented incident response procedures
  • Immediate containment and investigation protocols
  • Transparent customer notification within 72 hours
  • Post-incident analysis and preventive measures

Our Security Commitments

Data EncryptionActive
Multi-Factor AuthActive
Regular BackupsActive
Vulnerability ScanningActive
SOC 2 Type IIIn Progress
Penetration TestingActive

Have security questions?

Our team is happy to answer any questions about our security practices, compliance, or data handling.