Encryption everywhere
All data is encrypted at rest (AES-256) and in transit (TLS 1.3). Brand assets, extraction outputs, and user credentials never traverse the network in plaintext.
Security
BrandMythos handles your most sensitive brand assets: voice rules, visual systems, competitive positioning. We treat that trust as non-negotiable.
All data is encrypted at rest (AES-256) and in transit (TLS 1.3). Brand assets, extraction outputs, and user credentials never traverse the network in plaintext.
SAML and OAuth 2.0 single sign-on for enterprise plans. Role-based access control lets you scope permissions per workspace, brand, and export type.
Every extraction, export, team change, and brand update is logged with who, what, when, and from where. Logs are immutable and available for compliance review.
Production workloads run in isolated environments. Brand data is partitioned per tenant. Business and Enterprise plans support dedicated infrastructure on request.
Choose where your brand data lives. Enterprise plans support US, EU, and APAC data residency to meet local regulatory requirements.
Our controls are designed around the SOC 2 Type II trust service criteria. We are currently undergoing our first audit cycle. Enterprise customers can request our security questionnaire.
Admin, Editor, and Viewer roles. Admins control billing, SSO, and data export. Editors manage brands and extractions. Viewers can read but not modify.
We welcome security researchers. Report vulnerabilities to [email protected] and we will respond within 48 hours with a severity assessment and remediation timeline.
Security is not a feature we ship once. It is embedded in how we build, deploy, and operate every day.
You retain full ownership of every asset you upload and every extraction we produce from it. We do not train models on your brand data. We do not share it with other customers. We do not use it for anything beyond providing the service you requested.
When you delete a brand workspace, we purge all associated data within 30 days, including backups. Enterprise customers can request immediate purge with written confirmation.
Read our Privacy Policy and Terms of Service for the full legal framework.
Enterprise and Business customers can request our security questionnaire, penetration test summaries, and architecture documentation.