Document & Data Security

At NMBL Technologies, we take privacy and data security seriously. Like really seriously. After all, three of our founders are privacy attorneys at an AmLaw 100 firm, one started his career at Cisco, and another deploys Blockchain-as-a-Service solutions in super-low latency data centers.

Security Testing

Before deploying any updates, upgrades, or patches to Proxy, NMBL’s developers and security consultants perform in-depth penetration testing, ensuring the app remains protected from SQL injection, guarded against DDoS attacks, and fortified from any cybersecurity threat.

Data Segregation

All customer documents and data are logically segregated and never commingled with the document or data of other users.

Application Security

The Proxy application layer uses industry-standard authentication and access controls. Users connect via HTTPS, and NMBL prohibits cross-side pull and push requests. All data is encrypted in transit.

Third Party Tools

NMBL and its developers evaluate the security of all third-party tools before deploying them. Security tokens for third-party tools are updated every thirty days, and NMBL always builds on the most up-to-date SDK. Data is encrypted with protocols like TLS, and no data is stored by third parties..

Server Security

Built on AWS serverless architecture, Proxy uses 256 AES encryption for all data-at-rest, and implements end-to-end encryption from browser-to-server. On top of that, only whitelisted developer IP addresses can access our servers (through multi-factor authentication, of course).

Database Security

All Proxy databases are encrypted with 256 AES encryption and accessible only from Proxy application servers. Two factor authentication is required to access data. All data is backed up daily and stored in multiple offsite locations.

Security Testing

Before deploying any updates, upgrades, or patches to Proxy, NMBL’s developers and security consultants perform in-depth penetration testing, ensuring the app remains protected from SQL injection, guarded against DDoS attacks, and fortified from any cybersecurity threat.

Data Segregation

All customer documents and data are logically segregated and never commingled with the document or data of other users.

Application Security

The Proxy application layer uses industry-standard authentication and access controls. Users connect via HTTPS, and NMBL prohibits cross-side pull and push requests. All data is encrypted in transit.

Third Party Tools

NMBL and its developers evaluate the security of all third-party tools before deploying them. Security tokens for third-party tools are updated every thirty days, and NMBL always builds on the most up-to-date SDK. Data is encrypted with protocols like TLS, and no data is stored by third parties..

Server Security

Built on AWS serverless architecture, Proxy uses 256 AES encryption for all data-at-rest, and implements end-to-end encryption from browser-to-server. On top of that, only whitelisted developer IP addresses can access our servers (through multi-factor authentication, of course).

Database Security

All Proxy databases are encrypted with 256 AES encryption and accessible only from Proxy application servers. Two factor authentication is required to access data. All data is backed up daily and stored in multiple offsite locations.