Security
Enterprise-grade security, by default
Foundation
Protection at every layer of the platform
Caplia combines infrastructure safeguards, access controls, audit logging and recognised compliance certifications into a single, coherent system. Encrypted, access-controlled, fully logged, revocable at any time.
Encrypted infrastructure
Every Passport, document and data point is encrypted in transit and at rest. Production systems are isolated, access is least privilege, and every event is logged.
AES 256 encryption in transit and at rest
Isolated production environments with least privilege access
Continuous monitoring and incident detection across the stack
Encrypted at every layer
All customer data is encrypted in transit using TLS 1.3 and at rest with AES 256. This applies to every Passport, data room file, attachment and metadata field across the platform.
Hardened production systems
Production environments are isolated, with infrastructure controls limiting access to a small set of authorised personnel. Customer data does not leave the platform without an explicit, logged action.
24/7 monitoring
Systems are monitored continuously for anomalous activity, performance issues and security events, with defined incident response playbooks for rapid containment.
Access, controlled
Founders, funds and accelerators each operate with role-based access. Every action is logged, and access can be revoked instantly at any time.
Role-based permissions across founders, funds and partners
Single sign on, multi-factor authentication, session controls
Detailed activity tracking
Role based permissions
Access is managed through configurable roles, allowing teams to define who can see or change specific data.
Audit activity
Every view, share, edit and export is recorded with timestamp, user and action. Customers can review the full history of access to their data at any time.
Revoke access at any time
Modern authentication standards help protect accounts and reduce the risk of unauthorized access.
Privacy and compliance
Data ownership remains with our customers, supported by internal processes that align with common regulatory and compliance requirements.
Customer owned data
Privacy first data handling
Compliance aligned processes
Data ownership
Customers retain full ownership of their data, with no use beyond providing the service.
Privacy controls
Data handling follows defined privacy practices to limit access and prevent misuse.
Compliance alignment
Operational processes are designed to align with widely recognized compliance and regulatory standards.
FAQ
Security questions answered
Learn how infrastructure, permissions, and privacy practices protect your data.
Is data encrypted?
Yes, encryption in transit and at rest is included across all plans to protect sensitive information.
Is Single Sign On supported?
Are compliance reports available?
Can I choose data residency options?
