Security

Enterprise-grade security, by default

Caplia is the infrastructure layer for venture fundraising. Every Passport, every workflow and every line of company data sits inside an environment built to meet the security and compliance expectations of institutional users.

Get a more focused way to work with a native mobile app, built for modern teams and a smoother experience.

ISO
27001
CYBER
ESSENTIALS
PLUS
GDPR
COMPLIANT
ETHICAL AI
EUROPE
ISO
27001
CYBER
ESSENTIALS
PLUS
GDPR
COMPLIANT
ETHICAL AI
EUROPE
ISO
27001
CYBER
ESSENTIALS
PLUS
GDPR
COMPLIANT
ETHICAL AI
EUROPE
ISO
27001
CYBER
ESSENTIALS
PLUS
GDPR
COMPLIANT
ETHICAL AI
EUROPE

Foundation

Protection at every layer of the platform

Caplia combines infrastructure safeguards, access controls, audit logging and recognised compliance certifications into a single, coherent system. Encrypted, access-controlled, fully logged, revocable at any time.

Encrypted infrastructure

Every Passport, document and data point is encrypted in transit and at rest. Production systems are isolated, access is least privilege, and every event is logged.

  1. AES 256 encryption in transit and at rest

  2. Isolated production environments with least privilege access

  3. Continuous monitoring and incident detection across the stack

Encrypted at every layer

All customer data is encrypted in transit using TLS 1.3 and at rest with AES 256. This applies to every Passport, data room file, attachment and metadata field across the platform.

Hardened production systems

Production environments are isolated, with infrastructure controls limiting access to a small set of authorised personnel. Customer data does not leave the platform without an explicit, logged action.

24/7 monitoring

Systems are monitored continuously for anomalous activity, performance issues and security events, with defined incident response playbooks for rapid containment.

Access, controlled

Founders, funds and accelerators each operate with role-based access. Every action is logged, and access can be revoked instantly at any time.

  1. Role-based permissions across founders, funds and partners

  2. Single sign on, multi-factor authentication, session controls

  3. Detailed activity tracking

Role based permissions

Access is managed through configurable roles, allowing teams to define who can see or change specific data.

Audit activity

Every view, share, edit and export is recorded with timestamp, user and action. Customers can review the full history of access to their data at any time.

Revoke access at any time

Modern authentication standards help protect accounts and reduce the risk of unauthorized access.

Privacy and compliance

Data ownership remains with our customers, supported by internal processes that align with common regulatory and compliance requirements.

  1. Customer owned data

  2. Privacy first data handling

  3. Compliance aligned processes

Data ownership

Customers retain full ownership of their data, with no use beyond providing the service.

Privacy controls

Data handling follows defined privacy practices to limit access and prevent misuse.

Compliance alignment

Operational processes are designed to align with widely recognized compliance and regulatory standards.

FAQ

Security questions answered

Learn how infrastructure, permissions, and privacy practices protect your data.

  • Is data encrypted?

    Yes, encryption in transit and at rest is included across all plans to protect sensitive information.

  • Is Single Sign On supported?

  • Are compliance reports available?

  • Can I choose data residency options?

Get Caplia Today

Get Caplia Today