Security at Veorix
Last updated May 7, 2026
Veorix runs sensitive workflows for small businesses — calls, texts, schedules, customer records. We take that seriously. This page summarizes how we protect your data today and the controls we keep tightening as we grow.
1. Architecture and hosting
- Hosted on enterprise-grade cloud providers in the United States with isolated production environments.
- Network segmentation between marketing site, application services, and storage layers.
- Configuration changes peer-reviewed and applied through reproducible deploy pipelines.
2. Encryption
- TLS 1.2+ for all data in transit, including voice and SMS gateways.
- AES-256 for data at rest in databases, backups, and object storage.
- Secret material managed in dedicated key/secret stores with rotation policies.
3. Access controls
- Least-privilege roles, single sign-on, and MFA for the Veorix team.
- Production access is logged, time-bound, and reviewed.
- Customer admin actions are recorded for audit visibility.
4. Voice and SMS pipeline
- Carrier-grade telephony partners with documented uptime and abuse controls.
- Recordings and transcripts can be disabled per number; retention is configurable.
- Sensitive fields detected by intent classifiers are flagged for redaction in transcripts.
5. Data retention and deletion
- Workspace-level retention windows for recordings, transcripts, and message logs.
- Customer-initiated deletion of specific records on request.
- Backups rotated on a fixed schedule and destroyed after expiry.
6. Vendor management
We vet sub-processors for security, privacy, and reliability before onboarding them and review them on a recurring basis. Our list of sub-processors is available on request.
7. Incident response
- Documented playbooks for triage, containment, and customer communication.
- On-call rotation with escalation paths to engineering and leadership.
- Post-incident reviews with mitigation actions tracked to completion.
8. Reporting a vulnerability
Found something concerning? Email security@veorix.com with details and steps to reproduce. We aim to acknowledge within one business day and will keep you in the loop as we triage. Please give us a reasonable window before public disclosure.
This page describes our current controls. We are early-stage and not yet certified against frameworks such as SOC 2 or ISO 27001 — work is underway and we are happy to share our roadmap and detailed answers under NDA.
Back to home