Security First

At Newbula, security isn't an afterthought—it's fundamental to everything we build. We employ industry-leading security practices to protect your data and ensure the reliability of our platform.

Security Status

All Systems Operational
Encryption StatusActive
Last Security AuditDec 2024
Incident Response Time< 15 min
Uptime (Last 90 days)99.99%

Comprehensive Protection

Multi-layered Security Architecture

We implement defense in depth with multiple layers of security controls to protect your data and communications.

Data Encryption

End-to-end encryption for all data in transit and at rest

  • TLS 1.3 encryption for all API communications
  • AES-256 encryption for stored data
  • Encrypted call recordings and transcripts
  • Secure key management with AWS KMS

Infrastructure Security

Enterprise-grade cloud infrastructure with multiple layers of protection

  • SOC 2 Type II certified data centers
  • Geographic redundancy and automated backups
  • DDoS protection and rate limiting
  • Web Application Firewall (WAF)

Access Control

Comprehensive identity and access management

  • Multi-factor authentication (MFA)
  • Role-based access control (RBAC)
  • Single Sign-On (SSO) support
  • API key rotation and management

Compliance & Auditing

Meeting industry standards and regulatory requirements

  • GDPR and CCPA compliant
  • HIPAA compliance features available
  • Regular third-party security audits
  • Comprehensive audit logging

Trust & Compliance

Industry Certifications

We maintain rigorous compliance with industry standards and undergo regular third-party audits.

SOC 2 Type II

Annual third-party audits for security, availability, and confidentiality

ISO 27001

Information security management system certification (in progress)

HIPAA Compliant

Healthcare data protection standards for eligible customers

PCI DSS

Payment card industry data security standards

Security Best Practices

Incident Response

Our security team maintains a 24/7 incident response capability with defined procedures for:

  • Immediate threat detection and containment
  • Forensic analysis and root cause investigation
  • Customer notification within 72 hours of confirmed breaches
  • Post-incident reviews and security improvements

Employee Security

Background Checks

All employees undergo comprehensive background checks before accessing customer data

Security Training

Mandatory annual security training and regular phishing simulations

Access Controls

Principle of least privilege with regular access reviews

Device Security

Encrypted laptops with remote wipe capabilities and MDM

Data Protection Measures

Data Classification

All data is classified and handled according to sensitivity levels with appropriate controls

Data Minimization

We collect only the minimum data necessary and implement automatic data retention policies

Secure Development

SAST/DAST testing, dependency scanning, and security review for all code changes

Vulnerability Management

Regular penetration testing and vulnerability assessments with rapid patching

Shared Security Responsibility

Security is a shared responsibility. While we secure the infrastructure and platform, customers are responsible for:

  • Securing account credentials and API keys
  • Enabling multi-factor authentication
  • Managing user access and permissions
  • Securing data before upload
  • Compliance with calling regulations
  • Obtaining necessary consents
  • Monitoring account activity
  • Reporting security concerns promptly

Security Resources

Stay informed about our security practices and get help when you need it.

Security Whitepaper

Detailed technical documentation of our security architecture

Download PDF →

Report a Vulnerability

Help us maintain security by reporting potential vulnerabilities

Contact Security →

Status Page

Real-time system status and incident updates

View Status →

Security Questions?

Our security team is here to help. Contact us for security assessments, compliance documentation, or any security-related inquiries.