Continuum

Continuum Security

Security at Continuum

We build security into every layer of the platform. Here is how we protect your data and operations.

Infrastructure

  • TLS 1.3 in transit, AES-256 at rest for all data
  • Hosted on EU-based infrastructure with SOC 2 certified providers
  • Attribute-based access control with multi-factor authentication
  • 24/7 infrastructure monitoring with automated alerting

Data protection

  • Tenant-level data isolation with dedicated database instances
  • Automated encrypted backups with point-in-time recovery
  • Configurable data retention policies per organization
  • GDPR-compliant data processing with DPA available on request

Compliance & certifications

  • Aligned with ISO 27001 information security controls
  • NIS2-compliant incident handling and reporting workflows
  • GDPR-compliant by design with data minimization principles
  • Regular third-party penetration testing and vulnerability assessments

Vulnerability disclosure

We welcome responsible disclosure of security vulnerabilities. If you discover a potential issue, please contact us at [email protected]. We commit to acknowledging reports within 48 hours and will work with you to understand and resolve the issue.

Security — Continuum