We are a global remote company with hiring primarily based from the United States, Canada and India. Every employee regardless of the location we are hiring from, signs a confidentiality agreement and they undergo extensive security training before being assigned to the tasks.
All workstations provided to Proxikle employees run either MacOS, Debian or Windows by default. We have regular checks to ensure the operating systems are regularly updated, patched and properly configured to meet our security standards. Additionally, these machines are rotated periodically with strong, unique passwords and multi-factor authentication (MFA) to minimize risk.
We have strict access logging software on all our employee workstations to detect and track anomalies. This allows us to monitor role-based access and ensures data never leaves the employee’s workstation, whether physically or over the internet.
We utilize AWS, Google Cloud and other trusted infrastructure providers to build and launch our products at scale. This helps us to deliver secure web3 cloud infrastructure to our customers.
All of our dedicated servers are highly distributed and redundant by design across US East and US West to mitigate potential hardware failures. This helps us to build our own robust in-house infrastructure while reducing dependency on hyperscalers for every task.
Access to production servers is limited to very few users and production systems are designed to scale behind multiple layers of gateway protections and custom built in-house firewalls. Our production infrastructure scales independently and is fully isolated from testing and development environments where employees have broader access.
Customer data is encrypted both at rest and in transit and the encryption keys are never shared without proper authorization.
We retain your data only while your account remains active. Once an account or data is scheduled for deletion and it gets deleted after the period of inactivity, neither you nor Proxikle will have access to the deleted data.
We have stricter code reviews and automated security testing in place before the final product goes live. This helps us to identify and fix vulnerabilities early in the development process.
We regularly run backups of our databases to prevent data loss due to hardware failures. Backups are stored based on the region where they were created either in the US East region or the West region. This helps us to restore the backups at a relatively fast pace.
We maintain a documented incident response plan to quickly identify, contain, and remediate security events. Our team is trained to act promptly and effectively to minimize impact.
We continuously monitor our infrastructure and applications for vulnerabilities. Security patches are applied promptly, and regular scans help us stay protected against emerging threats.