Hermida Enterprise Solutions Hermida Enterprise Solutions
Trust Center

Security, privacy, and reliability you can audit.

We protect your data with modern encryption, strict access controls, and monitored infrastructure. Below is a concise view of how we secure and operate your environment.

Encryption at rest TLS 1.3 Zero Trust 24/7 monitoring

Security Pillars

Encryption & Data protection

Your data is encrypted at rest and in transit. Keys are rotated and access is role-scoped with least-privilege. Backups are encrypted and tested.

AES‑256 at rest TLS 1.3 Key rotation

Compliance

We are progressing toward SOC 2 Type I. Our controls map to leading frameworks and are reviewed on a regular cadence.

SOC 2 in progress Access reviews Change control

Privacy

We do not sell personal data. We honor GDPR and CCPA requests and limit data collection to what’s necessary to deliver service.

No data selling GDPR CCPA

Operational Excellence

Reliability

Multi‑AZ deployment with automated failover and continuous monitoring. Incident response drills and postmortems drive improvements.

Multi‑AZ Backups tested Incident runbooks

Access control

All admin access is SSO enforced with MFA. Administrative actions are logged and reviewed.

MFA SSO Audit logs

Transparency

We publish status and planned maintenance. You can request a copy of our security overview at any time.

Status page Change windows Security overview