Security

Our enterprise-grade security practices and measures

Last updated: 14 November 2025

Our Security Commitment

At 10×RED, we understand that security is paramount when dealing with sensitive psychometric data and talent analytics. We've implemented enterprise-grade security measures to protect your data and ensure the integrity of our platform.

Data Protection Measures

Encryption

  • Data in Transit: All data transmitted to and from our platform is encrypted using industry-standard TLS encryption
  • Data at Rest: All stored data is encrypted using AES-256 encryption standards
  • End-to-End Security: Sensitive psychometric data is encrypted throughout the entire processing pipeline

Access Controls

  • Role-Based Access Control (RBAC): Access to data is strictly controlled based on user roles and responsibilities
  • Multi-Factor Authentication (MFA): Required for all administrative and enterprise accounts
  • Regular Access Reviews: Periodic audits of user access permissions and privileges

Infrastructure Security

  • Cloud Security: Our platform is hosted on enterprise-grade cloud infrastructure with built-in security controls
  • Network Security: Firewalls, intrusion detection systems, and network monitoring protect against unauthorized access
  • Regular Penetration Testing: Third-party security assessments to identify and address potential vulnerabilities

Compliance Standards

We maintain compliance with industry standards and regulations:

  • SOC 2 Type II: Annual compliance audits for security, availability, and confidentiality
  • GDPR Compliance: Full compliance with European data protection regulations
  • CCPA Compliance: California Consumer Privacy Act compliance for US users
  • ISO 27001: Information security management system certification (in progress)

Data Handling Practices

Data Minimization

  • We collect only the data necessary for providing our services
  • Automatic data retention policies ensure data is not kept longer than necessary
  • Regular data purging and anonymization processes

Incident Response

  • 24/7 Monitoring: Continuous monitoring for security threats and anomalies
  • Incident Response Team: Dedicated security team for rapid response to any security incidents
  • Breach Notification: Immediate notification procedures for any data security incidents

Privacy by Design

Our platform is built with privacy and security as foundational principles:

  • Data Anonymization: Psychometric insights can be generated without exposing individual identities
  • Consent Management: Granular consent controls for all data processing activities
  • Data Portability: Users can export their data in standard formats
  • Right to Deletion: Complete data deletion capabilities upon user request

Security Training and Awareness

  • Employee Training: Regular security awareness training for all team members
  • Secure Development: Security-first approach to software development and deployment
  • Vendor Management: Strict security requirements for all third-party service providers

Reporting Security Issues

If you discover a security vulnerability or have security concerns, please report them immediately:

  • Security Email: security@10x.red
  • Responsible Disclosure: We follow responsible disclosure practices and appreciate security researchers who help improve our platform

Security Certifications

We maintain the following security certifications and undergo regular audits:

  • SOC 2 Type II (Annual)
  • Penetration Testing (Quarterly)
  • Vulnerability Assessments (Monthly)
  • Security Code Reviews (Continuous)

Contact Our Security Team

For questions about our security practices or to report security concerns:

We're committed to maintaining the highest security standards and protecting your trust in our platform.