Security
Security Philosophy
Security Is Feature Zero
Financial and operational data demand the highest level of protection. Matchloom is built on a zero-trust architecture with auditable AI workflows, ensuring every action is secure, traceable, and enterprise-ready from day one.
CORE PILLARS
Encryption
All data is protected using AES-256 encryption at rest and TLS 1.3 encryption in transit, ensuring secure communication and storage across systems.
Role-Based Access Control (RBAC)
Granular access controls with defined roles such as Admin, Approver, and Viewer ensure users only access what they are authorized to see and act upon.
Data Isolation
We support tenant-level data separation and optional dedicated VPC deployments for enhanced enterprise isolation and security.
Audit Trails
Every AI-generated action, approval, update, and communication is logged, creating a complete and transparent audit trail.
COMPLIANCE ROADMAP
Matchloom is aligned with global and regional compliance standards and continuously strengthens its governance framework.
-
DPDP / GDPR alignment
-
SOC 2 Type I (In Progress)
-
Regular internal penetration testing
-
Optional data residency configurations
To learn more about this, check out our article “Creating a Privacy Policy”.
.png)