Neomir
Trust & Security

Enterprise-Grade Security

Your data security is our top priority. Learn about our security architecture, compliance certifications, and how we protect your data.

Database Security

We leverage database technology trusted by thousands of developers for building and deploying secure applications.

Multi-Factor Authentication

Neomir allows organizations to require multi-factor authentication (MFA) for all accounts. MFA adds an additional layer of security by requiring a second factor to verify your user identity.

SOC 2 Type II

Our database provider is SOC2 Type II compliant. This is an important security policy when handling sensitive customer data.

Backups & Recovery

Our database is backed up every day. Point in Time Recovery allows restoring the database to any point in time.

HIPAA

Our database provider is HIPAA compliant. You can store Protected Health Information (PHI) on our hosted platform once you enter into a Business Associate Agreement (BAA) with us and fulfill your HIPAA obligations under our Shared Responsibility Model (SRM).

Vulnerability Management

We work with industry experts to conduct penetration tests. In addition to internal security reviews, we use various tools to scan our code for vulnerabilities.

Data Encryption

All our data is encrypted at rest with AES 256 and in transit via TLS. Sensitive information like access tokens and keys are encrypted at application level before being stored in the database.

Application Host

Our web application is hosted on secure infrastructure and comes with enterprise-grade security features.

Global Protection

Edge-localized protection. L3/L4 protection at every edge location. Our site stays protected without adding latency.

DDoS Mitigation

Our application host embeds bot management and protection against traffic abuse, in addition to a global L7 firewall.

Attack Challenge Mode

When under attack, we can activate "Attack Challenge Mode" to prevent malicious traffic by showing a verification challenge for visitors.

Observability

We maintain visibility into key metrics and production deployments, allowing us to monitor threats and requests in real-time.

Persistent Actions

We can block matching requests from suspicious clients for a set duration, preventing repeat malicious behavior and preventing unnecessary resource use.

Instant Propagation

Our application hosts firewall uses the same propagation pipeline as its cache infrastructure, so firewall changes can be seen across the globe in 300ms.

Artificial Intelligence

Our AI integration is designed with enterprise safety in mind. Here's how we ensure responsible AI use.

Security

We believe that your data is an asset of incredible value and must therefore be protected as such. That's why we limit the amount of data visible to our AI partners to the absolute minimum.

Optionality

Our AI features are made for the pioneers among our customers – but nobody should ever be obliged to use artificial intelligence. That's why all our AI features are deactivated by default and can be opted-in on interest.

Reliability

We strongly believe that the current state of artificial intelligence is a great support at tedious tasks. But it's far from being a full replacement for human work. That's why all AI contributions can be reviewed and adjusted by humans by default.

Identity Masking

We mask your identity towards OpenAI such that it's unclear where the requests originate from.

Customer 1
Customer 1 wants x
Customer 2
Customer 2 wants y
Customer 3
Customer 3 wants z
Neomir Masking
Neomir wants x, y, z
AI Provider
AI Provider

Our current AI provider is OpenAI. We intend to switch to open-source LLM's and eventually host our own models for maximum security and privacy.

Transparency

To improve transparency on where Neomir DQ uses AI, all our AI features are highlighted in our application as shown on this box.

Training Data

Any data transmitted through our AI features is not used to train or improve OpenAI's features and is not sold by Neomir or OpenAI.

Have Security Questions?

Our engineers are happy to answer your questions, complete security questionnaires, or provide additional documentation for your evaluation.