PENTIR · Data SecurityYour Data Security & Protection at PENTIR
At PENTIR , protecting your data is our highest priority. This page explains how we secure your information across infrastructure, encryption, access control, monitoring, and compliance frameworks.
1. Infrastructure Security
PENTIR is hosted on industry-leading cloud infrastructure with enterprise-grade security controls. Our environment includes:
- Protected, isolated networks for compute and storage.
- Automated failover and redundancy for high availability.
- Firewall rules to restrict inbound and outbound traffic.
- Regular OS and dependency patching.
2. Encryption
We apply strong encryption standards to protect your data:
- In transit: TLS 1.2+ encryption for all traffic.
- At rest: AES-256 encryption for storage layers.
- Secrets management: All keys stored in secure vaults.
3. Application Security
- Role-based access controls where appropriate
- MFA (multi-factor authentication) may be used for administrative access
- Automated scanning for vulnerabilities and misconfigurations.
- Secure development practices following OWASP guidelines.
4. AI & Data Processing Security
PENTIR uses strong safeguards when processing your inputs:
- Data is not used to train shared models without explicit consent.
- Inputs are stored minimally and only where necessary.
- Models process data in secure, sandboxed environments.
- Sensitive information may be minimized or excluded from logs where technically feasible.
5. Access Control & Monitoring
We restrict and monitor access strictly:
- Access is granted on a least-privilege basis.
- Employee access is logged and audited periodically.
- Real-time monitoring for unusual activity or threats.
- Automated alerts for configuration changes and access anomalies.
6. Compliance & Standards
We design our security practices with reference to recognized standards:
- ISO 27001 security controls
- GDPR & DPDPA readiness
- Best practices from SOC 2, NIST, and CIS benchmarks
7. Data Retention
Data is retained only as long as necessary for compliance, operational use, or contractual obligations. You may request deletion of specific data via our support team.
8. Incident Response
We maintain procedures to respond to security incidents and comply with applicable notification obligations.
9. Your Responsibilities
To maintain security, we ask customers to:
- Use strong passwords and enable MFA.
- Limit data uploads to what is necessary.
- Review user permissions regularly.
- Notify us immediately if unusual account activity is detected.
10. Contact for Security Concerns
If you believe your data has been compromised or have questions about our security practices, contact us at:
- Email: security@PENTIR
- Subject: "Security Inquiry – PENTIR "