Skip to main content
p15rp15r
HomeFeaturesServicesPricingDocsSupportBug TaxonomyAbout
Sign InSign Up
Back to HomeSecurity Program

Security At p15r

Security and privacy are built into platform operations, from authentication and data handling to monitoring and incident response.

Encryption in transit and at restRole-based access controlsIncident response readiness
Security Snapshot

Authentication

Clerk-based identity stack

Supports enterprise authentication requirements

Data handling

Encrypted storage and transport

Protected both at rest and in transit

Operations

Monitoring and incident workflows

Designed for rapid detection and response

Core Controls

Security Foundations

Encryption At Rest

Stored data is encrypted with strong encryption standards across database and file storage layers.

Encryption In Transit

All application traffic is protected with modern TLS to secure data between clients and services.

Secure Authentication

Authentication is handled through Clerk with support for SSO, MFA, and enterprise identity providers.

Secure Infrastructure

Workloads run on enterprise cloud infrastructure with strong operational and security controls.

Access Controls

Role-based access limits data visibility and actions to authorized users and teams.

Backup And Recovery

Automated backups and recovery options support continuity and incident recovery workflows.

Infrastructure Security

  • SOC 2-oriented cloud platform foundations
  • DDoS protection and web application firewall coverage
  • Automated patch and update strategy
  • Continuous monitoring and operational alerting

Application Security

  • Regular security testing and review cycles
  • Secure software development lifecycle practices
  • Dependency and vulnerability scanning
  • Input validation and output encoding standards

Compliance

Standards And Frameworks

GDPR

EU data protection framework

CCPA

California privacy regulation

SOC 2

Infrastructure control alignment

WCAG 2.2

Accessibility conformance baseline

HIPAA

Available for qualifying healthcare use cases

Data Residency

Default hosting is in the United States. For enterprise customers with regional requirements, p15r can support residency options and contractual data handling controls.

  • EU data residency options
  • Custom enterprise data residency configurations
  • Data Processing Agreements for compliance alignment

Contact info@perspectivetester.com for enterprise options.

Incident Response

The incident response process is designed for fast triage, controlled escalation, and transparent communication with affected customers.

  • 24/7 monitoring and alerting
  • Defined security escalation and triage procedures
  • Customer notification process for confirmed incidents
  • Post-incident analysis and remediation tracking

Report A Security Vulnerability

If you identify a potential vulnerability, please report it responsibly. We review every submission and prioritize confirmed security issues.

Report Vulnerability
p15rp15r

Reliable Accessibility Operations

If your team cannot prove progress consistently, compliance delivery slows down for everyone. p15r keeps audits, fixes, and stakeholder reporting in one operational flow.

Evidence-backed workflow
Live remediation tracking

Demo

Request a Demo

We usually reply within one business day.

Resources

  • Features
  • Services
  • Pricing
  • Severity Tiers
  • Docs
  • Changelog
  • Support

Company

  • About
  • Contact
  • Security
  • Accessibility
  • Data Rights

Social

  • LinkedIn

Accessibility Principle

“Accessibility is not a final checklist step. It is the quality bar every user should meet on their first interaction.”

Built into every p15r workflow

Read our story
Officer Fuzzability

© 2026 p15r Software Inc.

SupportPrivacy PolicyTerms of UseCookie Policy