Security

Last updated: November 29, 2025

1. Our Security Commitment

At OrcaMonitor, security is our top priority. We implement comprehensive security measures to protect your data and network information.

2. Infrastructure Security

  • Data Centers: SOC 2 Type II certified facilities
  • Network: DDoS protection and Web Application Firewall
  • Redundancy: Multi-region deployment with automatic failover
  • Monitoring: 24/7 security monitoring and incident response

3. Data Encryption

  • In Transit: TLS 1.3 encryption for all communications
  • At Rest: AES-256 encryption for stored data
  • Credentials: Secure vault with hardware security modules

4. Access Control

  • Multi-factor authentication (MFA)
  • Role-based access control (RBAC)
  • Single Sign-On (SSO) integration
  • Session management and automatic timeouts

5. Compliance & Certifications

  • SOC 2 Type II certified
  • GDPR compliant
  • ISO 27001 aligned
  • Regular third-party penetration testing

6. Vulnerability Management

  • Regular security audits and assessments
  • Automated vulnerability scanning
  • Responsible disclosure program
  • Timely security patches and updates

7. Incident Response

We maintain a comprehensive incident response plan including:

  • 24/7 security monitoring
  • Immediate incident escalation procedures
  • Customer notification within 72 hours of confirmed breach
  • Post-incident analysis and reporting

8. Report a Security Issue

If you discover a security vulnerability, please report it to security@orcamonitor.com