Xano LogoSECURITY CENTERSECURITY CENTER
Xano Pricing

Xano Security and Compliance

Xano is dedicated to the safeguarding of customer data. Security is placed at the forefront of our product strategy, emphasizing its utmost importance. In constructing our platform, we adhere to the industry's finest practices, ensuring it is robust, scalable, and fortified against potential threats. Continuous vigilance and periodic evaluations of our program are conducted to guarantee that it aligns with, or surpasses, the standards of compliance and regulatory obligations.

Jacques Antikadjian: Co-Founder & CSO

Compliance

Compliant with the highest software and security standards

ISO 27001
SOC 2
SOC 3
ISO 9001
ISO 27701
GDPR
CPRA
LGPD
PIPEDA
FERPA
HIPAA
CCPA
PDPA
PPIP
PPIPA
DPF
CMMCPending
NISTPending

Documentation

Product Security
  • Multi-Factor Authentication
  • Audit Logging
  • SSO Support
  • Role-Based Access Control
View more

Reports
  • SOC 3 Report
  • Network Diagram
  • PCI DSS (ASV Network Scan)
  • Pentest Report
View more

Access Control
  • Logging
  • Password Security
  • Data Access
View more

App Security
  • Software Development Lifecycle
  • Code Analysis
  • Vulnerability & Patch Management
View more

Data Privacy
  • Geolocation Privacy
  • Employee Privacy Training
  • Cookies
View more

Data Security
  • Backups Enabled
  • Encryption-at-rest
  • Access Monitoring
  • Data Erasure
View more

Endpoint Security
  • Endpoint Detection & Response (EDR)
View more

Self-Assessments

We are working on our security compliance. We can provide completed questionnaires upon request.

Security Grades

We are constantly monitoring the security of our website. We will post our grades from public security rating agencies when they become available.

ESG
  • Fair Labor
  • Anti-Bribery and Corruption
  • Diversity, Equity, and Inclusion
  • Environmental Stewardship
View more

Infrastructure
  • Anti-DDoS
  • Google Cloud Platform
View more

Corporate Security
  • Internal SSO
  • Penetration Testing
  • Internal Assessments
  • Incident Response
View more

Legal
  • Privacy Notice
  • Subprocessors
  • Terms & Conditions
  • Data Processing Addendum (DPA)
View more

Network Security
  • Firewall
View more

Policies
  • Data Classification Policy
  • Patch Management Life Cycle
  • Information Security Policy
  • Government Data Request Policy
View more

Risk Profile
  • Recovery Time Objective
  • Data Access Level
  • Third Party Dependence
  • Critical Dependence
View more