Security
Security your management team can trust
Controls are designed for high-value retail operations: clear accountability, strict access boundaries, and resilient daily routines.
Tenant isolation
Server-side RBAC
Rate limits + caps
Hardened uploads
Encrypted backups
App Check
Break-glass controls
PDPL alignment
AML / KYC ready
Audit-ready records
Tenant isolation
Your store data remains isolated from other businesses by design.
- Store context is validated on every request
- No cross-business visibility paths
Role-based access control
Permissions are enforced on the backend. The UI reflects permissions but never determines them.
- Clear role boundaries for each team
- Traceable records for sensitive actions
Cost guardrails
Expensive operations are guarded with transactional controls to prevent runaway costs.
- Rate limits for heavy operations
- Daily cost protection thresholds
- Emergency shutdown controls
Hardened uploads
Image intake is controlled to reduce risk and prevent misuse.
- Allowed formats and size limits
- Automatic cleanup of temporary files
Backups & recovery
Daily backup routines support recovery readiness without disrupting branch operations.
- Controlled backup export sizes
- Optional encrypted local retention
- Guided restore controls
Desktop companion security
The optional desktop companion is hardened for use on store PCs with multiple layers of protection.
- Local-only access model
- Protected key verification
- Safe limits for request handling
Need a security walkthrough?
We'll review your workflows, permissions, backups, and operational risks end-to-end.