Security at Proxikle

We have customers who trust us with their personal data when signing up for our products. We take this seriously and we have built our products with security embedded in it. This is why we have robust security and privacy measures in place across all of our systems.

Organizational Security

Before any employee is assigned with the tasks in our organization, we conduct a series of security tests

Security Training

We are a global remote company with hiring primarily based from the United States, Canada and India. Every employee regardless of the location we are hiring from, signs a confidentiality agreement and they undergo extensive security training before being assigned to the tasks.

Secure Machines

All workstations provided to Proxikle employees run either MacOS, Debian or Windows by default. We have regular checks to ensure the operating systems are regularly updated, patched and properly configured to meet our security standards. Additionally, these machines are rotated periodically with strong, unique passwords and multi-factor authentication (MFA) to minimize risk.

Access Logging & Monitoring

We have strict access logging software on all our employee workstations to detect and track anomalies. This allows us to monitor role-based access and ensures data never leaves the employee’s workstation, whether physically or over the internet.

Infrastructure Security

Secure Cloud Providers

We utilize AWS, Google Cloud and other trusted infrastructure providers to build and launch our products at scale. This helps us to deliver secure web3 cloud infrastructure to our customers.

Distributed by Design

All of our dedicated servers are highly distributed and redundant by design across US East and US West to mitigate potential hardware failures. This helps us to build our own robust in-house infrastructure while reducing dependency on hyperscalers for every task.

Secured by Multiple Gateways

Access to production servers is limited to very few users and production systems are designed to scale behind multiple layers of gateway protections and custom built in-house firewalls. Our production infrastructure scales independently and is fully isolated from testing and development environments where employees have broader access.

Data Security

We understand our customer's data and privacy is of utmost importance. This is why we have designed our infrastructure in such a way that it adheres strictly to our privacy practices outlined in our policies.

Secure by Design

Customer data is encrypted both at rest and in transit and the encryption keys are never shared without proper authorization.

Data Removal

We retain your data only while your account remains active. Once an account or data is scheduled for deletion and it gets deleted after the period of inactivity, neither you nor Proxikle will have access to the deleted data.

Strict Code Reviews

We have stricter code reviews and automated security testing in place before the final product goes live. This helps us to identify and fix vulnerabilities early in the development process.

Operational Security

Regular Data Backups

We regularly run backups of our databases to prevent data loss due to hardware failures. Backups are stored based on the region where they were created either in the US East region or the West region. This helps us to restore the backups at a relatively fast pace.

Incident Response

We maintain a documented incident response plan to quickly identify, contain, and remediate security events. Our team is trained to act promptly and effectively to minimize impact.

Vulnerability Management

We continuously monitor our infrastructure and applications for vulnerabilities. Security patches are applied promptly, and regular scans help us stay protected against emerging threats.

Transparency creates Trust & Trust creates Relationships!
Trust is something which you cannot buy, but something that must be hard earned!
Manoj Narayan
CEO, Proxikle
If you have any questions with regards to security or if you discover any security vulnerabilities in our products, please write to us at security@proxikle.com
Get Started