Trust Center
Transparency and security are the foundation of Nexplore. This portal provides real-time visibility into our security posture, compliance documentation, and data protection guarantees.
GDPR Compliant
Certified
SOC 2 Type II
In Progress
ISO 27001
Planned
PCI DSS
Compliant
Resources
Security Policies & Reports
Information Security Roles and Responsibilities
Secure Development Policy
Incident Response Plan
Cryptography Policy
Operations Security Policy
Data Management Policy
Access Control Policy
Code of Conduct
SOC 2 Type II Report (2025)
Controls
Verified Security Measures
Infrastructure Security
- Encryption key access restricted
- Production application access restricted
- Production database access restricted
- Multi-factor authentication (MFA) required
Organizational Security
- Confidentiality Agreement acknowledged by contractors
- Confidentiality Agreement acknowledged by employees
- Performance evaluations conducted
- Background checks for all staff
Product Security
- Data encryption utilized at rest and in transit
- Control self-assessments conducted
- Regular penetration testing
- Secure coding practices (OWASP)
Internal Security Procedures
- Cybersecurity insurance maintained
- Configuration management system established
- Change management procedures enforced
- Business continuity plan tested
Data and Privacy
- Customer data deleted upon leaving
- Strict no-access policy for Nexplore staff
- Contractual NDA included in every agreement
- Data residency guarantees (Egypt/AWS)
Subprocessors
Third-Party Partners
| Name | Purpose | Location |
|---|---|---|
| Amazon Web Services | Cloud Infrastructure | Ireland / UAE |
| OpenAI | AI Services (Models) | United States |
| Pinecone | Vector Database Hosting | United States |
| Postmark | Email Delivery (Transactional) | United States |
| Logtail | System Logging & Monitoring | United States |