Security at Vyxflow
An architecture designed for demanding IT departments: encryption, isolation and traceability at every step.
Secret encryption
All API keys, OAuth tokens and passwords are encrypted with AES-256-GCM at rest. A connection test is performed and validated before any storage in the database.
Multi-tenant isolation
Each client workspace (tenant) is isolated at data, execution and network level. One tenant’s resources are never accessible by another, even in case of an application bug.
Immutable logs
Every action (mapping, synchronization, API access) is timestamped and recorded in an immutable log. These logs cannot be modified or deleted.
Responsible disclosure policy
Found a vulnerability? Contact us at security@vyxflow.com. We take every report seriously and respond promptly.
Ready to take control of your catalog?
Transparent pricing · Documented API · BigCommerce & PrestaShop connectors in production