Security

Security your management team can trust

Controls are designed for high-value retail operations: clear accountability, strict access boundaries, and resilient daily routines.

Tenant isolation
Server-side RBAC
Rate limits + caps
Hardened uploads
Encrypted backups
App Check
Break-glass controls
PDPL alignment
AML / KYC ready
Audit-ready records
Tenant isolation

Your store data remains isolated from other businesses by design.

  • Store context is validated on every request
  • No cross-business visibility paths
Role-based access control

Permissions are enforced on the backend. The UI reflects permissions but never determines them.

  • Clear role boundaries for each team
  • Traceable records for sensitive actions
Cost guardrails

Expensive operations are guarded with transactional controls to prevent runaway costs.

  • Rate limits for heavy operations
  • Daily cost protection thresholds
  • Emergency shutdown controls
Hardened uploads

Image intake is controlled to reduce risk and prevent misuse.

  • Allowed formats and size limits
  • Automatic cleanup of temporary files
Backups & recovery

Daily backup routines support recovery readiness without disrupting branch operations.

  • Controlled backup export sizes
  • Optional encrypted local retention
  • Guided restore controls
Desktop companion security

The optional desktop companion is hardened for use on store PCs with multiple layers of protection.

  • Local-only access model
  • Protected key verification
  • Safe limits for request handling
Need a security walkthrough?
We'll review your workflows, permissions, backups, and operational risks end-to-end.
Book a demo