Prefolio
Product Demo Pricing Training
Sign In Start Free Trial
Product Demo Pricing Training Sign In

Security

Last updated: April 2, 2026

Prefolio handles sensitive client portfolio data, business cases, and financial models. We treat security as a core product requirement, not an afterthought. This page outlines how we protect your data.

Data Encryption

  • In transit — All connections are encrypted using TLS 1.2+ with strong cipher suites. HSTS is enforced across all domains.
  • At rest — All data is encrypted using AES-256. Database backups are encrypted with separate key management.
  • Key management — Encryption keys are managed through dedicated key management services with automatic rotation.

Infrastructure

The Prefolio platform is hosted on secure cloud infrastructure with:

  • Geographically distributed hosting for redundancy and low latency
  • Automated daily backups with point-in-time recovery
  • Network-level isolation between tenants
  • DDoS protection and web application firewall (WAF)
  • Continuous infrastructure monitoring and alerting

Tenant Isolation

Prefolio is a multi-tenant platform serving consultancies with multiple client organisations. Data isolation is enforced at the application and database level:

  • Row-level security ensures client data never crosses organisation boundaries
  • Each client organisation's data is logically isolated within the database
  • API access is scoped to the authenticated user's organisation and permissions

Access Control

  • Authentication — Secure authentication with support for multi-factor authentication (MFA)
  • Role-based permissions — Granular roles control access to features and data at the organisation level
  • Internal access — Prefolio employees follow the principle of least privilege. Production data access requires MFA and is logged
  • Session management — Sessions expire after inactivity and tokens are rotated regularly

Compliance

Prefolio is designed to support compliance with:

  • GDPR — Data processing agreements available on request. Data subject rights are supported through the platform and via [email protected]
  • Data residency — Contact us for data residency requirements specific to your organisation

Application Security

  • Secure software development lifecycle (SDLC) with code review for all changes
  • Dependency scanning for known vulnerabilities
  • Input validation and output encoding to prevent injection attacks
  • Regular penetration testing by independent security assessors

Incident Response

We maintain a documented incident response plan that includes:

  • 24/7 automated monitoring and alerting for anomalous activity
  • Defined escalation procedures and response timelines
  • Post-incident reviews with root cause analysis
  • Notification to affected customers within 72 hours of a confirmed data breach, in accordance with GDPR requirements

Vendor Security

All third-party services are assessed against our security requirements before integration. We maintain an inventory of sub-processors and review their security posture on a regular basis. A list of sub-processors is available on request.

Responsible Disclosure

If you believe you have discovered a security vulnerability in Prefolio, we encourage responsible disclosure. Please report it to [email protected]. We will acknowledge receipt within 24 hours, investigate promptly, and keep you informed of progress.

Questions

For security-related questions or to request documentation for your procurement or compliance review, contact [email protected].

Prefolio

Evidence-backed AI portfolio planning for consultancies and enterprise teams.

Product
How It Works Capabilities Pricing Documentation
Company
About Blog Book a Demo Contact
Legal
Privacy Policy Terms of Service Security

© 2025 Prefolio. All rights reserved.