Trust Provy to keep your data secure and meet your compliance requirements.
Provy only allows client requests using robust TLS protocols and ciphers. All client communication with Provy utilizes cryptographically hashed headers and timestamps to verify authenticity. It's the same protocol used by financial institutions.
Separate access controls are enforced at each layer of infrastructure. Multi-factor authentication is required for access to Provy software infrastructure. All application and user access logs are stored centrally and monitored.
Communication between our infrastructure and third parties is transmitted over encrypted tunnels. All client communication with AWS API utilizes cryptographically hashed headers and timestamps to verify authenticity.
Provy regularly undergoes both internal and external network penetration tests and third-party code reviews. Provy has also completed a security report. If you have any questions, please email us at email@example.com.
If you think that you have found a security issue, please contact us at firstname.lastname@example.org. We take all reports seriously. Please do not publicly disclose the issue until we've addressed it.