~/security

Your data security,
our top priority.

We understand the importance of keeping your data safe. That‘s why we adopt enterprise-grade technologies and a comprehensive set of policies and controls to deliver products with security baked in at their core.

Certifications
Trusted by
FastBill logo
Cal.com logo
Plex logo
Hydrow logo
Parachute logo
Vercel logo
Livekit logo
Audius logo
Healthylife logo
Speedscale logo
Prisma logo
Ping.gg logo
Analogue logo
FastBill logo
Cal.com logo
Plex logo
Hydrow logo
Parachute logo
Vercel logo
Livekit logo
Audius logo
Healthylife logo
Speedscale logo
Prisma logo
Ping.gg logo
Analogue logo

Data security measures

Data encrypted in transit and at rest

All data is encrypted both in transit and at rest using AES-256 bit encryption, with TLS used to secure network traffic. Our encryption practices align with industry standards and are regularly audited to ensure the highest level of security.

Secure, reliable infrastructure

Axiom systems are segmented into separate networks and protected through restrictive firewalls. Network access to production environments is tightly restricted. Monitors are in place to ensure that service delivery matches SLA requirements.

Redundancy and disaster recovery

Encrypted backups and replication across availability zones ensure business continuity in the event of system failure. Axiom tests restoration capabilities cyclically to ensure your data will always be protected and accessible.

Organizational security

Axiom employees receive regular security training, covering topics like information security and data privacy. Our remote team adheres to stringent security requirements like encryption of storage and use of two-factor authentication.

Access and user management

SSO and SAML

Axiom supports secure, centralised user authentication through SAML-based SSO and makes it easy to keep access grants up-to-date with support for the industry standard SCIM protocol.

Role-based access control

Take control over access to your data and features within Axiom through role-based permissions. Assign specific roles across your team, including read-only, admin and owner.

Audit logs

Searchable audit logs provide comprehensive tracking of all activity in your Axiom organization to meet even the most stringent compliance requirements.

Compliance

SOC2 Type II

Axiom has secured SOC 2 Type II certification, verifying that strict security measures are in place to protect customer data. Reports are available to eligible customers on request under NDA.

General Data Protection Regulation (GDPR)

Axiom is committed to GDPR compliance and adheres to core principles including data minimisation and rights of the data subject. For more details regarding 3rd party data visit sub-processors.

California Consumer Privacy Act (CCPA)

Axiom complies with the requirements of the CCPA, with transparency on data collection, processing and storage. We have a Data Processing Addendum available upon request.

ISO/IEC 27001 Certification

Axiom has established a robust system to manage information security risks concerning the data we control or process, adhering to the highest standards and practices outlined in this international standard.

FAQ

LOCATION:

EARTH

Ready to get started?

Learn how to start ingesting and querying data in less than a few minutes, or jump right into our playground to try Axiom.

Contact Team Illustration

Want to talk to the team?

Axiom can efficiently scale to ingest and store all your data, all the time. Get a demo from the team, or send us a message.

We’re on Discord!

Get support, collaborate with other users and developers, share knowledge, provide feedback, and hang out!