Security

Bank-level security protecting your financial data with industry-leading encryption and best practices.

Your Data is Protected

We employ multiple layers of security to ensure your financial information remains safe, private, and accessible only to you.

End-to-End Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption. Your financial information is protected from the moment it leaves your device.

  • TLS 1.3 for data in transit
  • AES-256 encryption at rest
  • Encrypted database backups

Secure Authentication

Multi-factor authentication and secure session management protect your account from unauthorized access.

  • SuperTokens session management
  • Bcrypt password hashing
  • Rate limiting on login attempts

Secure Infrastructure

Our infrastructure is built on industry-leading cloud providers with redundant systems and automated backups.

  • 99.9% uptime SLA
  • Automated daily backups
  • Multi-region redundancy

OWASP Compliance

We follow OWASP Top 10 security best practices and conduct regular security audits to identify and address vulnerabilities.

  • Regular security assessments
  • Vulnerability scanning
  • Penetration testing

Access Control

Role-based access control ensures that only authorized users can access specific features and data within your account.

  • Team role-based permissions
  • Session timeout protection
  • IP-based access logging

Data Privacy

Your data belongs to you. We never sell your information and provide tools to export or delete your data at any time.

  • No data selling or sharing
  • One-click data export
  • Account deletion available

Security Practices

Monitoring & Incident Response

We continuously monitor our systems for suspicious activity and maintain a 24/7 incident response team ready to address any security concerns.

  • Real-time threat detection
  • Automated security alerts
  • Rapid incident response protocols

Employee Access

Our team follows strict security protocols. Employee access is limited to what's necessary for their role, and all access is logged and audited regularly.

  • Principle of least privilege
  • Background checks for all employees
  • Regular security training

Report Security Issues

If you discover a security vulnerability, please report it responsibly. We take security seriously and will respond promptly to all reports.

Responsible Disclosure

Please email security concerns to security@finbutler.ai. Include detailed information about the vulnerability and steps to reproduce it. We will acknowledge receipt within 48 hours and work with you to address the issue.

What to Include

  • Description of the vulnerability
  • Steps to reproduce
  • Potential impact
  • Suggested fix (if available)

Questions About Security?

We're here to help. Contact our security team with any questions or concerns.