🚀 New: Real-time alerting & custom thresholds now available — See what's new

Security & Compliance

Enterprise-grade security built into every layer of the platform.

Certifications and compliance standards

SOC 2 Type II
GDPR
HIPAA
ISO 27001
FedRAMP Ready
PCI DSS
Infrastructure

Infrastructure Security

Multiple layers of protection safeguard your data at every level of our infrastructure.

Encryption at Rest

AES-256 encryption for all stored data. Encryption keys are managed through a dedicated key management service with automatic rotation.

Encryption in Transit

TLS 1.3 for all communications. All connections enforce HTTPS with strict transport security and certificate pinning for mobile clients.

Network Isolation

VPC isolation, private subnets, WAF protection, and network segmentation ensure complete infrastructure-level separation.

DDoS Protection

Multi-layer DDoS mitigation with automatic traffic analysis, rate limiting, and geographic filtering at the edge.

Application

Application Security

Security controls built into every layer of the application stack.

Enterprise Data Isolation

Complete data isolation per organization. Row-level security, separate encryption contexts, and automatic security boundaries prevent any cross-organization data access.

Role-Based Access Control

Granular permissions with MFA enforcement. Define custom roles, assign capabilities, and enforce least-privilege access across your organization.

Audit Logging

Complete audit trail of all actions. Every login, data access, configuration change, and API call is logged with tamper-proof retention.

API Security

Rate limiting, API key authentication, circuit breakers, and request validation protect every endpoint from abuse and misuse.

Zero PHI Storage

Opslytica never stores protected health information. Identifiable fields (member IDs, case IDs) are automatically anonymized by your systems before data collection. Your encryption key stays in your infrastructure — we store only irreversible tokens.

Client-Managed Keys

Your organization holds the HMAC secret key used for pseudonymization. Opslytica cannot reverse hashed identifiers. Same-input determinism preserves full analytical capability without exposing patient data.

Compliance

Compliance & Certifications

We maintain rigorous compliance standards to meet the requirements of regulated industries.

SOC 2 Type II

Annual audits by independent third party. Our SOC 2 Type II report covers security, availability, and confidentiality trust service criteria.

GDPR

Data processing agreements, right to deletion, data portability. Full GDPR compliance with EU-based data residency options available.

HIPAA

BAA available, PHI safeguards, access controls. Our zero-PHI architecture means identifiable data is pseudonymized before it reaches Opslytica, supplemented by administrative, physical, and technical safeguards required by the HIPAA Security Rule.

ISO 27001

Information security management system certified. Our ISMS covers all aspects of information security risk management and controls.

FedRAMP

Authorization in progress for government deployment. We are pursuing FedRAMP Moderate authorization for federal agency use.

PCI DSS

Compliant payment processing through Stripe. We never store, process, or transmit cardholder data directly on our infrastructure.

Need a security review?

Our security team is available to discuss your requirements, answer questions, and provide documentation for your vendor review process.

Hi there! 👋

How can we help you today?

Our team typically responds within a few hours during business hours.

Send us a message