Trust & Safety
Security
An overview of the security practices and infrastructure that protect the Prolytics platform and customer data.
Infrastructure
The Prolytics platform is hosted on infrastructure provided by Google Cloud.
Our systems are deployed in secure cloud environments with access controls and monitoring designed to protect infrastructure and services.
Data Handling
Prolytics is designed to minimize data storage. Key principles include:
- Prolytics does not store raw customer telemetry data
- analytics data is processed temporarily to generate insights
- schema mappings and configuration settings may be stored for service functionality
- customers retain ownership and control of their data
This architecture reduces the amount of sensitive data stored by the platform.
Encryption
Security measures include:
- encrypted HTTPS connections for all network communication
- encryption of data in transit using modern TLS standards
- restricted access to internal infrastructure systems
Authentication
User authentication is managed through:
- email and password authentication
- magic link login
- Google login
Authentication infrastructure is provided by Clerk.
Payments
All billing and subscription payments are processed by Stripe.
Prolytics does not store credit card numbers or payment card information.
Monitoring and Incident Response
System reliability and monitoring are maintained using tools such as Better Stack.
These systems help detect performance issues, monitor uptime, and identify potential security incidents.
Responsible Disclosure
If you believe you have discovered a security vulnerability affecting Prolytics, please report it to:
security@prolyticshq.techWe appreciate responsible disclosure and will investigate all reports promptly.