Security
Xyte is built with security at its core. Our platform follows modern SaaS security standards and enterprise IT requirements, making it easier to complete security reviews and vendor assessments with confidence.
Compliance & Governance
SOC 2 Type II Certified
Xyte maintains SOC 2 Type II certification. Independent auditors validate our controls for security, availability, and confidentiality.
GDPR Compliance
Xyte supports GDPR requirements for customers operating in the European Union. EU customer data is hosted in Ireland.
Privacy & Data Protection
Xyte maintains a published Privacy Policy and Data Processing terms. Data handling practices align with industry standards for SaaS providers.
Subprocessors
We maintain transparency regarding subprocessors used for infrastructure and service delivery. A current list is available here.
Identity & Access Management
Single Sign-On (SSO)
Xyte supports SAML-based SSO integration with enterprise identity providers.
Two-Factor Authentication (2FA)
Multi-factor authentication is supported and can be enforced at the organization level.
Role-Based Access Control (RBAC)
Administrators can define user roles and permissions to ensure appropriate access control.
Principle of Least Privilege
Internal access to production systems is restricted based on role and necessity.
Data Security
Encryption in Transit
All data transmitted between devices, Edge components, and Xyte cloud services is encrypted using TLS 1.2+.
Encryption at Rest
Customer data stored within Xyte infrastructure is encrypted at rest using industry-standard encryption mechanisms provided by AWS.
Data Segregation
Customer environments are logically isolated to ensure strict separation of data.
Secure APIs
All API communications require authentication and are protected via encrypted transport.
Network Architecture & Connectivity
Outbound-Only Architecture
Xyte is designed so that all data traffic with client organizations is outbound only. No inbound firewall ports need to be opened. No incoming connections are initiated from the Xyte cloud into customer networks.
No VPN Required
Xyte does not require VPN tunnels or inbound routing rules to operate.
Hosting & Infrastructure
Amazon Web Services (AWS)
Xyte is hosted on AWS.
EU Hosting
European customer data is hosted in AWS Ireland regions.
High Availability Architecture
Infrastructure is designed for redundancy and reliability.
Continuous Monitoring
Systems are monitored for uptime, performance, and security anomalies.
Edge Security
Outbound Communication Only
Edge devices initiate outbound connections to Xyte cloud services. No inbound connections are required.
Hardened Device Configuration
Edge components are designed with minimal exposed services and hardened operating system configurations.
Secure Device Claiming & Provisioning
Devices must be securely claimed and authenticated before being associated with an organization.
Encrypted Communications
All traffic between Edge components and Xyte cloud is encrypted.
Operational Security Practices
Access Controls
Production access is restricted and logged.
Audit Logging
System events and administrative actions are logged for traceability.
Vulnerability Management
Security updates and patches are applied according to defined internal policies.
Secure Development Practices
Xyte follows secure coding practices and performs internal review and testing prior to releases.
Documentation & Transparency
Customers can access detailed technical documentation including internet access requirements, Edge security documentation, data subprocessors, and security and privacy FAQs. Additional documentation is available upon request to support formal security reviews.
For additional information or to support a security questionnaire, please contact your Xyte representative or email [email protected].
Updated 6 days ago
