Security & compliance
Security and compliance are built into the platform—not bolted on.
Built for the day your auditor or investor asks for a single source of truth.
Data isolation
Multi-tenant architecture
Tenant data is logically isolated. No cross-tenant access at the API or data layer. Access is enforced at the API and database layer by tenant identity.
Encryption
Encryption at rest and in transit (TLS). Sensitive data protected using industry-standard practices.
Access scoping
Access scoped by role and organization. Your data is isolated by design. No use of your data for training or cross-tenant analytics without explicit consent.
Identity & access
Proprietary identity layer
Centralized authentication, SSO-ready, role-based access control (RBAC), and multi-factor authentication (MFA). Session management and device control. No dependency on third-party identity for core security.
Role-based access control
Owner, manager, staff, and viewer permissions enforced at the application and API layer.
Compliance readiness
Audit trails for financial and operational actions. Designed for GST and audit requirements. Path to SOC 2 and institutional requirements stated clearly; we document our posture and improve over time.
Indian context: GST-ready reports, e-sign readiness, agreement and notice tracking. From single-owner to institutional: same platform, same audit trail.
Uptime & reliability
Target uptime
Uptime target designed for operational continuity. Blue-green deployments; no planned downtime for releases. Automated health checks and incident response readiness.
Backup & recovery
Backup and recovery procedures designed for operational continuity. We document our posture and improve over time; no exaggerated claims.
Auditability
Event-emitting design: every payment, move-in, meter reading, and key config change is an event. Logs and trails available for operators and for institutional due diligence. Enables dispute resolution, compliance, and investor due diligence from one audit trail.