Security at TACTIC

Your venture data is sensitive. We take security seriously and implement industry best practices to protect your information.

Our Security Practices

Data Encryption

  • • TLS 1.3 encryption for all data in transit
  • • AES-256 encryption for data at rest
  • • Encrypted database connections
  • • Secure key management practices

Infrastructure Security

  • • Hosted on a SOC 2 Type II compliant platform
  • • Database on a SOC 2 compliant provider
  • • Automatic security updates
  • • DDoS protection and mitigation

Authentication & Access

  • • Secure password hashing (bcrypt)
  • • Session-based authentication
  • • Role-based access control
  • • Secure password reset flows

Data Protection

  • • Regular automated backups
  • • Point-in-time recovery capability
  • • Data isolation between users
  • • GDPR-compliant data handling

AI Processing Security

TACTIC uses AI models for venture assessments. Here's how we protect your data during AI processing:

  • No training on your data: Your venture submissions are not used to train AI models
  • Secure API communication: All API calls use encrypted HTTPS connections
  • Enterprise-grade provider: Our AI provider maintains SOC 2 Type II certification
  • Data retention limits: Processed data is not retained by our AI provider beyond API response

Payment Security

All payments are processed securely through a PCI DSS Level 1 certified payment processor:

  • • We never store your full credit card number on our servers
  • • All payment data is handled directly by our payment provider's secure infrastructure
  • • Industry-leading payment processing trusted by millions of businesses
  • • 3D Secure authentication for additional fraud protection

Responsible Disclosure

Help us keep TACTIC secure

We appreciate the work of security researchers who help identify vulnerabilities. If you discover a security issue, please report it responsibly:

  • • Email us at security@dtactic.com
  • • Provide detailed steps to reproduce the vulnerability
  • • Allow us reasonable time to address the issue before disclosure
  • • Do not access or modify data belonging to other users

We commit to acknowledging reports within 48 hours and providing updates on remediation progress.

Questions About Security?

Our team is happy to answer any questions about our security practices.

Contact Security Team