Security and Compliance

Your trust is our top priority

Rest easy with infrastructure you can trust. At Prelay, we embrace enterprise-grade security and data privacy across our team and product development to ensure customers are protected.

SOC
SOC 2 Type 2
SSO
SSO Authentication
GDPR
GDPR Compliant
GCP
GCP secure
World-class reliability at your fingertips
With customers around the world, Prelay is committed to upholding the latest data privacy and security standards.
End-to-end encryption

At-rest data is protected with full-disk encryption using AES-256 or better. Data in transit to Prelay, or across the Prelay network, is encrypted using TLS 1.2 or newer.

Secure infrastructure

Prelay’s staging and production environments are hosted on Google Cloud Platform (GCP). Data centers are protected by 24/7 monitoring, biometrics, and ISO 27001 and SOC 3 compliance.

Data durability

We deploy multiple redundant application servers and databases with automatic failover to ensure high availability, along with regular automated backups.

Single sign-on (SSO)

Prelay customers can authenticate users through their own systems, eliminating the need to maintain and protect additional login credentials.

Our ongoing commitment to security
Prelay is proactively compliant with the latest philosophy and technology around information security.
Penetration testing

Prelay employs independent security firms to perform regular penetration testing, to actively uncover and eliminate vulnerabilities in our application.

Employee security training

Securing our customer's data is a team effort. Our employees undergo regular security training to stay up-to-date with best practices. Company laptops are also protected by strict password and security policies, including full-disk encryption.

Secure software development

Prelay’s engineering team utilizes secure coding practices, and employs manual and automated vulnerability testing as part of our software development lifecycle.

Restricted data access

Access to customer data is limited to authorized employees who require it for their job. Every bit of data access is logged and protected by two-factor authentication (TFA).

Have an issue to report?

If you believe you’ve discovered a potential vulnerability, please let us know by emailing us at

Send Icon
security@prelay.com

Announcing our SOC 2 Type 2 Compliance

At-rest data is protected with full-disk encryption using AES-256 or better. Data in transit to Prelay, or across the Prelay network, is encrypted using TLS 1.2 or newer.

Learn More