Commitment to Security

Privacy & Security

At Wytebox, we are committed to protecting your data and ensuring the security and privacy of your information. We employ a multi-layered approach to security, combining robust product features with strict adherence to industry best practices.

Product Security

Data Encryption

All data transmitted to and from Wytebox is encrypted in transit using TLS 1.2+. Data stored within our Google Cloud Platform (GCP) Vertex environment is encrypted at rest using Google's robust encryption services.

Redaction

Wytebox automatically redacts sensitive information, such as usernames and passwords, to protect your privacy. This redaction is applied by default and helps ensure the security of your personal information. Redacted information is irretrievable.

Intrusion Detection & Prevention

We leverage Google Cloud's advanced intrusion detection and prevention systems to monitor our infrastructure for potential threats and ensure data integrity and confidentiality. Suspicious activity triggers immediate alerts to our security team.

Data Ownership

We've built our platform on the principle that only you control who sees your outputs, reports, or any content in your Wyteboxes. This strict access control extends to all levels of your organization – even corporate administrators or supervisors cannot view your data without your explicit consent.

Infrastructure Security

Google Cloud Platform (GCP) Hosting

Wytebox's infrastructure is hosted on GCP Vertex, benefiting from Google's robust security measures, including physical security, network security, and data center redundancy.

Web Application Firewall (WAF)

Our web application firewall (WAF) shields against common threats like SQL injection and cross-site scripting, providing an additional layer of protection for our applications.

Least Privilege Access Control

We enforce least privilege access control across our GCP infrastructure, limiting access to sensitive data to authorized personnel with a clear business need.

Segregated Environments

Our development, staging, and production environments are fully segregated within GCP to prevent unauthorized access and ensure the integrity of our live systems.

Organizational Security

Access Control

Internal access to systems and data is strictly controlled and limited to authorized personnel with legitimate business need.

Endpoint Management

We use advanced endpoint monitoring tools to monitor and secure all devices connected to our network, ensuring they meet our security standards and protecting against potential threats.

Asset Inventory

We maintain a comprehensive inventory of our production systems and assets hosted on GCP. This detailed tracking and security infrastructure ensures a secure and well-managed environment for your data.

Formalized Offboarding

Our offboarding process ensures prompt revocation of system and data access for departing employees.