Summary of technical and organizational measures for Juxto.
Security responsibilities are assigned and reviewed regularly.
Policies cover access control, data handling, and incident response.
Access is restricted by role and least-privilege principles.
Authentication uses passkeys and OTP email verification.
Data is encrypted in transit using TLS.
Sensitive data at rest is protected using encryption and access controls.
Customer data is logically separated by workspace.
Backups follow rolling schedules with controlled access.
Security logs record authentication, access events, and operational alerts.
Logs are reviewed to detect abuse and maintain service reliability.
We maintain incident response procedures and notify customers of reportable breaches without undue delay.
Post-incident reviews drive corrective actions.
Primary hosting runs on self-managed servers hosted at netcup in Nuremberg, Germany; physical access to data centers is controlled by the provider.
Subprocessors for payments and email are contractually bound to security and confidentiality obligations.