Security

Effective Date: April 2026

Zalanx is built to help technical teams move from noisy telemetry to clear, explainable incident response. This page outlines our current security practices and platform approach.

Security

Platform Security

Zalanx is designed for the secure handling of telemetry and operational security data used in monitoring, investigation, and defense workflows.

The platform is built to help technical teams move from raw signals to understandable incident context, with an emphasis on visibility, explainability, and practical response support.

Our approach is to keep security considerations close to the product itself, especially in areas where teams rely on logs, alerts, and operational history to make decisions.

Data Handling

Users retain ownership of the data they submit or connect to Zalanx.

Telemetry is processed to provide analysis, alerts, incident visibility, and defense workflow support across the platform.

This can include logs, metadata, security-relevant events, and related operational records needed to surface useful context inside the product.

We aim to handle this data in a way that supports security operations without overstating how the platform should replace customer judgment, internal controls, or incident response processes.

Access Control

Zalanx uses workspace-scoped access patterns so teams can manage security activity within the context of their own environment.

Connected services and automation workflows may rely on API keys or other credentials, which should be created, stored, and rotated with care.

Customers are responsible for protecting account credentials and integration secrets, since the security of connected systems depends in part on how those credentials are managed.

Encryption

Zalanx is built to support encryption in transit and secure handling practices for data moving through the platform.

We aim to apply sensible safeguards around sensitive operational data and service interactions, while describing our controls carefully and honestly.

We do not make claims about encryption scope, storage architecture, or certification status beyond what has been explicitly confirmed.

Monitoring and Logging

The platform supports system monitoring, report history, incident visibility, and defense action records so teams can understand what happened and what actions were taken.

These records are intended to improve explainability, operational traceability, and day-to-day security response workflows.

Where relevant, Zalanx is designed to help teams review signal history, investigation context, and operational actions without losing sight of the underlying event trail.

Security Practices

Zalanx is developed with a security-minded approach that emphasizes careful handling of credentials, controlled operational access, and practical safeguards around sensitive telemetry workflows.

We aim to improve platform resilience over time through ongoing product hardening, secure development habits, and operational controls appropriate to the current stage of the product.

Our goal is to communicate clearly about what the platform does today, continue improving the product responsibly, and avoid overstating maturity or coverage where formal validation is still in progress.

Compliance Status

Zalanx is built with security best practices in mind. Formal compliance certifications, including SOC 2, are not yet complete unless explicitly stated.

If our compliance posture changes in the future, we will describe that status directly rather than implying certifications or audit outcomes that have not been completed.

Contact

For security-related questions, please contact:

info@zalanx.com