V
Vyxflow
fr en

Security at Vyxflow

An architecture designed for demanding IT departments: encryption, isolation and traceability at every step.

🔒

Secret encryption

All API keys, OAuth tokens and passwords are encrypted with AES-256-GCM at rest. A connection test is performed and validated before any storage in the database.

🏢

Multi-tenant isolation

Each client workspace (tenant) is isolated at data, execution and network level. One tenant’s resources are never accessible by another, even in case of an application bug.

📋

Immutable logs

Every action (mapping, synchronization, API access) is timestamped and recorded in an immutable log. These logs cannot be modified or deleted.

🛡️

Responsible disclosure policy

Found a vulnerability? Contact us at security@vyxflow.com. We take every report seriously and respond promptly.

Ready to take control of your catalog?

Transparent pricing · Documented API · BigCommerce & PrestaShop connectors in production