Xano LogoSECURITY CENTERSECURITY CENTER
Xano Pricing

Xano Security and Compliance

Xano is dedicated to the safeguarding of customer data. Security is placed at the forefront of our product strategy, emphasizing its utmost importance. In constructing our platform, we adhere to the industry's finest practices, ensuring it is robust, scalable, and fortified against potential threats. Continuous vigilance and periodic evaluations of our program are conducted to guarantee that it aligns with, or surpasses, the standards of compliance and regulatory obligations.

Jacques Antikadjian: Co-Founder & CSO

Compliance

Compliant with the highest software and security standards

ISO 27001
SOC 2
SOC 3
ISO 9001
ISO 27701
GDPR
CPRA
LGPD
PIPEDA
FERPA
HIPAA
CCPA
PDPA
PPIP
PPIPA
DPF
CMMCPending
NISTPending

Documentation

Product Security
  • Data Security
  • Multi-Factor Authentication
  • Audit Logging
  • Role-Based Access Control
View more

Reports
  • PCI DSS (ASV Network Scan)
  • Pentest Report
  • SOC 3 Report
  • Network Diagram
View more

Access Control
  • Data Access
  • Logging
  • Password Security
View more

App Security
  • Code Analysis
  • Software Development Lifecycle
  • Vulnerability & Patch Management
View more

Data Privacy
  • Cookies
  • Geolocation Privacy
  • Employee Privacy Training
View more

Data Security
  • Access Monitoring
  • Encryption-in-transit
  • Backups Enabled
  • Data Erasure
View more

Endpoint Security
  • Endpoint Detection & Response (EDR)
View more

Self-Assessments

We are working on our security compliance. We can provide completed questionnaires upon request.

Security Grades

We are constantly monitoring the security of our website. We will post our grades from public security rating agencies when they become available.

ESG
  • Carbon Neutrality
  • Anti-Bribery and Corruption
  • Environmental Stewardship
  • Whistleblowing Program
View more

Infrastructure
  • Anti-DDoS
  • Google Cloud Platform
View more

Corporate Security
  • Internal Assessments
  • Email Protection
  • Incident Response
  • Internal SSO
View more

Legal
  • Data Processing Addendum (DPA)
  • Subprocessors
  • Terms & Conditions
  • Privacy Policy
View more

Network Security
  • Firewall
View more

Policies
  • Encryption Policy
  • Password Policy
  • Next Generation Antivirus (NGAV) Policy
  • Government Data Request Policy
View more

Risk Profile
  • Recovery Time Objective
  • Critical Dependence
  • Data Access Level
  • Hosting
View more