Trust & Safety

Security

An overview of the security practices and infrastructure that protect the Prolytics platform and customer data.

Infrastructure

The Prolytics platform is hosted on infrastructure provided by Google Cloud.

Our systems are deployed in secure cloud environments with access controls and monitoring designed to protect infrastructure and services.

Data Handling

Prolytics is designed to minimize data storage. Key principles include:

  • Prolytics does not store raw customer telemetry data
  • analytics data is processed temporarily to generate insights
  • schema mappings and configuration settings may be stored for service functionality
  • customers retain ownership and control of their data

This architecture reduces the amount of sensitive data stored by the platform.

Encryption

Security measures include:

  • encrypted HTTPS connections for all network communication
  • encryption of data in transit using modern TLS standards
  • restricted access to internal infrastructure systems

Authentication

User authentication is managed through:

  • email and password authentication
  • magic link login
  • Google login

Authentication infrastructure is provided by Clerk.

Payments

All billing and subscription payments are processed by Stripe.

Prolytics does not store credit card numbers or payment card information.

Monitoring and Incident Response

System reliability and monitoring are maintained using tools such as Better Stack.

These systems help detect performance issues, monitor uptime, and identify potential security incidents.

Responsible Disclosure

If you believe you have discovered a security vulnerability affecting Prolytics, please report it to:

Emailsecurity@prolyticshq.tech

We appreciate responsible disclosure and will investigate all reports promptly.