Teralo Security
Your trust is at the center of what Teralo does, with security as a top priority. Products, processes, and systems are designed to protect customers, users, and data.
Contact: support@teralo.co
Cloud & Data Storage
Teralo uses Cloudflare to deliver secure, reliable, and scalable access through web browsers. The platform employs enterprise-grade DDoS protection, Web Application Firewall (WAF), and global edge network to defend against external threats.
Cloudflare's global network ensures data remains accessible, protected, and optimized for performance across regions with automatic failover and redundancy.
Account Security & Permissions
Key security measures include:
- Single Sign-On (SSO): Users log in with one set of credentials across applications
- Multi-Factor Authentication (MFA): Multiple verification forms required for account access
- Identity Provider Integration: Support for Microsoft Entra ID (Azure Active Directory)
- Role-Based Permissions: Users assigned roles (administrators, managers, designers, viewers) for secure, streamlined access
Incident Response & Backups
Teralo maintains over 99.95% average uptime since launch. Systems are continuously monitored for real-time threat detection and response.
- Automated backups performed every 24 hours
- Structured Incident Response procedures follow Information Security Management System (ISMS) protocols
- Process includes investigation, containment, remediation, and post-incident analysis
Data Protection
Industry-standard encryption protocols protect information in transit and at rest. Regular security audits proactively identify and mitigate risks.
Connections use HTTPS with Transport Layer Security (TLS 1.2+). Data in transit employs AES256 encryption, SHA-2 for message authentication, and RSA for key exchange.
Testing
Teralo conducts regular penetration testing in collaboration with leading cybersecurity firms. Tests simulate real-world attack scenarios to identify vulnerabilities and ensure robust defenses against evolving threats.
Customers can request the latest penetration testing report.
Staged Releases & Updates
Software updates introduce new features, enhancements, and performance improvements with simultaneous client deployment. All releases undergo thorough testing in development and staging environments before following strict release protocols. Major releases include detailed release notes and feature previews.
AI Security
Teralo leverages Google Gemini, a managed AI service with enterprise-grade protection.
Privacy practices:
- Prompts and responses are not stored or logged
- Data is not used to train any AI models
- No data exposure outside Teralo's private cloud environment