Back to home

Security

Last updated: March 5, 2026

At Clamint, protecting your data is fundamental to everything we do. We implement industry-standard security practices and continuously improve our security posture to ensure your information remains safe.

1. Infrastructure Security

Our infrastructure is built on enterprise-grade cloud platforms with multiple layers of protection:

  • Cloud Hosting: We use industry-leading cloud providers with SOC 2 Type II certification
  • Network Security: All traffic is routed through firewalls and DDoS protection
  • Isolation: Customer environments are logically isolated to prevent cross-tenant access
  • Redundancy: Multi-region deployment ensures high availability and disaster recovery
  • Monitoring: 24/7 infrastructure monitoring and automated alerting

2. Data Encryption

We encrypt your data at every stage:

  • In Transit: All data is encrypted using TLS 1.3 during transmission
  • At Rest: Data stored in our databases is encrypted using AES-256 encryption
  • Backups: All backups are encrypted and stored in geographically separate locations
  • API Keys: Sensitive credentials are stored in encrypted vaults and never logged

3. Authentication & Access Control

We implement robust authentication and access control mechanisms:

  • Secure Authentication: Support for email/password and Google OAuth 2.0
  • Session Management: Secure, httpOnly cookies with automatic expiration
  • Row-Level Security: Database-level policies ensure users can only access their own data
  • Role-Based Access: Granular permissions based on user roles within organizations
  • Rate Limiting: Protection against brute force and abuse attacks

4. Application Security

Our development practices prioritize security at every stage:

  • Secure Development: All code undergoes security review before deployment
  • Input Validation: Strict validation on all user inputs to prevent injection attacks
  • Dependency Scanning: Automated scanning for known vulnerabilities in dependencies
  • OWASP Compliance: We follow OWASP Top 10 guidelines to prevent common vulnerabilities
  • Content Security Policy: Strict CSP headers to prevent XSS and data injection attacks

5. Data Privacy & Compliance

We are committed to data privacy and regulatory compliance:

  • GDPR: Full compliance with European data protection regulations
  • Data Minimization: We only collect data necessary to provide our services
  • Right to Erasure: Users can request complete deletion of their data
  • Data Portability: Export your data at any time in standard formats
  • Privacy by Design: Security and privacy considerations are built into every feature

6. Incident Response

We maintain a comprehensive incident response plan:

  • Detection: Automated monitoring and alerting for security anomalies
  • Response: Dedicated incident response team with defined escalation procedures
  • Communication: Prompt notification to affected users in case of a security incident
  • Recovery: Rapid restoration of services with root cause analysis
  • Post-Incident: Thorough review and implementation of preventive measures

7. Responsible Disclosure

We welcome security researchers to help us maintain the security of our platform. If you discover a potential security vulnerability, please report it responsibly:

  • Email your findings to security@mintai.com
  • Provide sufficient detail to reproduce the vulnerability
  • Allow reasonable time for us to address the issue before public disclosure
  • Do not access or modify data belonging to other users

We appreciate your efforts in keeping Clamint secure and will acknowledge your contribution.

8. Contact Us

For security-related inquiries or to report a vulnerability:

Security Team: security@mintai.com

General Support: support@mintai.com

Website: https://mintai.com

Ready to track your AI visibility?