Security
How we protect your data
Our Commitment
Security is a top priority at Zeno. We understand that you're trusting us with your data, and we take that responsibility seriously. Here's how we keep your information safe.
Data Encryption
In Transit
All data transmitted between your browser and our servers is encrypted using TLS 1.3, the latest security protocol.
At Rest
Your data is encrypted at rest using AES-256 encryption in our database, powered by Supabase's enterprise security features.
Infrastructure Security
- Hosting: Deployed on Vercel with automatic DDoS protection
- Database: Supabase with Row Level Security (RLS) policies
- Authentication: Secure, passwordless email verification
- Monitoring: 24/7 automated security monitoring
AI & Your Data
Your data is NEVER used to train AI models.
When you create a dashboard, your data is processed by Claude (Anthropic's AI) solely to generate your specific output. It is not stored, learned from, or used for any other purpose. Anthropic's enterprise API has strict data handling policies that prevent training on customer data.
Access Controls
We implement strict access controls:
- Role-based access control for all internal systems
- Multi-factor authentication for team members
- Regular access reviews and audit logs
- Principle of least privilege for all operations
Sharing & Permissions
You have full control over who can see your dashboards:
- Private by default: Dashboards are only visible to you
- Shareable links: Generate unique links to share specific dashboards
- Revoke access: Disable sharing links at any time
Incident Response
In the unlikely event of a security incident, we have a comprehensive response plan that includes immediate investigation, containment, user notification, and remediation. We are committed to transparency and will notify affected users promptly.
Report a Vulnerability
We welcome responsible disclosure of security vulnerabilities. If you discover a security issue, please report it to us at security@zeno.fyi
Please include details about the vulnerability and steps to reproduce it. We'll acknowledge your report within 48 hours and work with you to resolve the issue.