Security Policies

Secure Partnership with Querio

Commitment to Data Safety

At Querio, we understand the critical importance of data security in today's digital landscape and particularly in our industry. Our commitment to safeguarding your data is at the forefront of all our operations, offering you peace of mind when choosing us as your data co-pilot. We have implemented stringent security measures to ensure your partnership with us is not only beneficial but also secure.

Our Comprehensive Security Approach

Vulnerability Management

Querio conducts ongoing internal vulnerability assessments, with a dedicated response team ready to address any issues swiftly. We further bolster our security through web-based scanning and monitoring tools designed to pinpoint and mitigate security vulnerabilities.

Regular Auditing and Monitoring

We employ a robust program that includes regular auditing, monitoring, and reviewing of our architecture, codebase and logs. This proactive approach ensures continuous oversight and swift responses to any potential risks.

Secure Infrastructure

Our services are powered by Amazon Web Services (AWS), a leader in secure cloud hosting. For detailed insight into AWS's security protocols, visit AWS Security Information.

Adherence to Privacy Regulations

Recognizing the importance of privacy, Querio is compliant with CCPA and GDPR. Upon onboarding, we sign a Data Processing Agreement (DPA) to formalize our commitment to protecting your data according to the highest standards.

Advanced Encryption Technologies

All data within Querio's Virtual Private Cloud (VPC) is encrypted at rest using AES-256 encryption, and data in transit is protected using HTTPS/TLS 1.3. This ensures that every piece of data is secure, whether stored or being conveyed.

Pursuit of Excellence in Compliance

Querio is actively working towards achieving SOC 2 TYPE II, ISO 27001, and ISO 9001 certifications, reflecting our ongoing commitment to operational excellence and stringent security standards.

Fine-grained Access Controls

Implementing role-based access and minimal permission settings, Querio provides confidence that each user only interacts with the data necessary for their role, adding a powerful layer of defense.

Secure Connections

To securely connect to data sources and destinations, we implement SSH tunneling, SSL/TLS, IP whitelisting, and utilize HTTPS for web-based resources.

Data Retention and Storage

Customer data is not permanently retained. When temporary data storage is necessary, it is maintained within a secure segment of the VPC, or customers' own storage solutions can be used when on-premise deployments are used.

Rigorous Policies and Personnel Training

Our policies cover everything from our software development and security testing processes to 2FA requirements for workplace applications. We ensure our personnel are thoroughly vetted and regularly trained on information security best practices.

security overview

Your Trusted Data Co-Pilot

At Querio, your data's integrity is our top priority. We bring together advanced technology, comprehensive policies, and a team dedicated to security to ensure your data remains protected. As we work toward attaining respected certifications, our existing measures stand as testament to our unwavering commitment to security. Trust Querio as your partner in navigating the complexities of data management with the assurance that your data is in safe hands.

Book a demo

Create reports, explore data, and answer questions 20x faster.

Book a demo
GDPRCCPA Compliant

2024 Querio Ltd. All rights reserved.