Security
We do not compromise on data security.
Concision is built with end-to-end multi-layered security and undergo regular security reviews from third party security firms to ensure the highest level of data protection and compliance.
Concision is compliant with

Encryption
Data is encrypted in transit and at rest using the most secure algorithms available.
Zero Data Retention
Your data is never used to train AI models and is deleted permanently once you remove it.
Two Factor Authentification
All internal accounts require two-factor authentication to mitigate the risk of unauthorized access.
Zero-Trust Architecture
Concision was architected from the beginning with security in mind. We employ a zero-trust security model, which means that no components or systems can communicate with each other without specific authorization and authentication.
Concision can be configured with a self-hosted or third party data storage layer so that files never touch Concision servers or infrastructure. You and your users interact with Concision directly, but the files are stored on independent infrastructure.

Principle of Least Privilege
Only strictly required access is granted to accounts and personnel to minimize risk.
Automated Security Checks
All code, libraries and operating systems are regularly scanned for vulnerabilities and patches or updates are made to mitigate identified security issues.
Continuous Security Monitoring & Threat Detection
We leverage modern AI tools and run continuous monitoring on our infrastructure. Threat detection monitors for malicious activity and anomalous behavior to keep systems and data secure.
Secure Links for Client Login
Concision leverages secure links for user authentication. This is more convenient for user and more secure because terminated users can no longer access Concision once their IT department shuts off e-mail access.
Account Level Security
Account sessions are protected through inactivity timeouts.
Regular access reviews
Access to systems and accounts is regularly reviewed to ensure no personnel have inappropriate access to systems or data.
Security
Questions & Answers
Our Team previously ran a software platform for government agencies in Germany. If you have any inquiry regarding the data security and privacy of our platform, get in touch!