Data Protection
Your data is paramount. All information transmitted to and from Saturation is encrypted using secure socket layer (SSL) technology. Our Information Security Policy underpins our dedication to data protection, and we regularly conduct risk assessments to identify and mitigate potential threats.
Privacy First
We deeply respect your privacy. Client data remains confidential and is only accessed as necessary to provide our services. We do not share client data unless required to perform the required services.
Secure User Authentication
We use Google Authentication for secure sign-ins, harnessing Google's formidable security measures to reduce password-related risks. Your pre-existing Google account's security settings are used for this purpose.
Continuous Monitoring
Shared Responsibility
We encourage all users to take proactive steps towards their data's security, such as using strong, unique passwords and practicing safe sharing.
Reliable Infrastructure
Saturation is built on Render, a trusted platform that automatically encrypts data in transit and at rest. Render employs high-security protocols such as network isolation and traffic encryption. They comply with globally recognized certifications like SOC 2 and GDPR.
IT Controls and Practices
We are enforcing multi-factor authentication (MFA) to enhance security. We apply MFA to all accounts on internal applications and third-party services, such as cloud providers. Key IT policies and baseline standards ensure that all devices and services adhere to our security standards, from deployment to end-of-service.
Our commitment to security is unwavering. We’re continuously refining our security measures to ensure uncompromised data integrity. Our Information Security Policy is regularly updated to align with evolving business operations and security risks.