Security First

Built for
Enterprise Security

Your guard data, credentials, and operational intelligence are protected by industry-leading security practices at every layer.

Encrypted Credentials

All passwords hashed with bcrypt. Sensitive tokens encrypted at rest and in transit via TLS 1.3.

JWT Authentication

Short-lived access tokens with secure refresh token rotation stored in Redis. Automatic expiry and revocation.

Role-Based Access Control

Admin, Manager, and Guard roles with strict permission boundaries. No privilege escalation paths.

Audit Logs

Comprehensive activity logging for all sensitive operations. Full traceability for compliance and forensics.

OWASP Compliant

Codebase reviewed against OWASP Top 10. Input validation, rate limiting, and CORS protection built in.

Secure Infrastructure

Isolated database credentials, environment-based secrets, and no hardcoded keys anywhere in the codebase.

What We Protect

Every layer of the stack is covered.

Guard identity data and biographic information
Location and GPS tracking records
Attendance and clock-in/out timestamps
Shift schedules and operational plans
Manager and admin account credentials
Internal communications and incident reports
API tokens and refresh credentials

Questions about security?

Reach our security team directly. We respond within 24 hours.

Contact Security Team