Security & privacy

Your pipeline data is yours.

We handle some of the most sensitive data in your business — deal values, rep performance, CRM access tokens. Here's exactly how we protect it.

AES-256-GCM at restAdmin MFA enforcedRLS-isolated tenantsGDPR Art. 17 + 202-year audit trailHMAC-signed OAuthNo model training

How we protect your data

AES-256-GCM encryption at rest

OAuth tokens for every connected integration (Salesforce, HubSpot, Gong, Zoom, Gmail, Outlook) are encrypted with AES-256-GCM before they touch the database. Encryption keys live only in our deployment environment, never in source.

OAuth-only CRM access

We never ask for or store your CRM password. All integrations connect via OAuth — you authorize access through the provider's own login flow, and you can revoke it at any time. State parameters are HMAC-signed to prevent CSRF and replay.

No model training on your data

Your deal data is never used to train AI models — ours or anyone else's. Per-org PII redaction is available for Enterprise plans, scrubbing emails / phone numbers / SSNs / cards out of the LLM payload and restoring them in the response.

Comprehensive audit log

Every privileged action — sign-in, role change, integration connect/disconnect, plan changes, API key issuance, webhook updates, data exports — writes a timestamped audit row. Default retention is 2 years (configurable 1–10 years per org).

Role-based access + admin MFA

Four roles: Admin, RevOps, Manager, Rep. Reps see only their own deals; Managers see their teams; Admins control the workspace. Admin actions (rename org, role changes, delete) require TOTP multi-factor authentication.

Session security

Cookie-based sessions verified locally against the auth provider's published JWKS — no shared secrets, no per-request round-trip. All traffic is HTTPS with HSTS preload; preview deploys are SSO-gated.

Tenant isolation enforced at the database

Postgres Row-Level Security with FORCE on every public table. Cross-tenant access is impossible by construction — even a SECURITY DEFINER function or compromised owner role respects organization boundaries.

GDPR Art. 17 + Art. 20

Right-to-erasure (delete account, delete organization) and right-to-portability (downloadable JSON export of your org's deals, audit log, and settings) are both available in-product. DPA available on request.

Responsible disclosure

If you discover a security vulnerability in DealRadar, please report it to us privately before disclosing it publicly. We take all reports seriously and aim to respond within 48 hours.

Report a vulnerability

Security questions?

If you have specific security requirements — DPA requests, penetration test results, or enterprise security review — get in touch.

Contact us