Security at WiseBidder
Your data security is our top priority. We implement industry-leading security measures to protect your sensitive government contracting information.
Enterprise-Grade Security
Built with the same security standards used by Fortune 500 companies and government agencies.
Security Features
All data stored in our databases is encrypted using AES-256 encryption, the same standard used by banks and government agencies.
All data transmitted between your browser and our servers is encrypted using TLS 1.3, the latest and most secure transport protocol.
We use Clerk for authentication, providing enterprise-grade security with multi-factor authentication and session management.
Our infrastructure is hosted on SOC 2 compliant cloud providers with 24/7 monitoring, DDoS protection, and automated threat detection.
Data Protection
Secure Cloud Infrastructure
- Data centers with physical security controls
- Geographic redundancy and disaster recovery
- Regular automated backups
- Network isolation and firewalls
- Intrusion detection systems
Access Controls
- Role-based access control (RBAC)
- Multi-factor authentication (MFA)
- Session management and timeouts
- Audit logging of all access
- Principle of least privilege
Compliance
SOC 2 Type II
Service Organization Control audit
GDPR
EU General Data Protection Regulation
CCPA
California Consumer Privacy Act
HIPAA
Not applicable to our services
AI & Document Security
When you upload RFP documents for AI analysis, we take special precautions to protect your sensitive information:
Document Handling
- Documents encrypted during upload
- Stored in isolated, encrypted storage
- Only accessible by your organization
AI Processing
- Data not used for AI model training
- Processed via secure API connections
- No data retained by AI providers
Report a Vulnerability
We take security vulnerabilities seriously. If you discover a potential security issue, please report it responsibly.
Please include "Security Report" in the subject line. We aim to respond within 24 hours.
Our Security Practices
Regular Audits
We conduct regular security audits and penetration testing to identify and address vulnerabilities.
Employee Training
All employees undergo security awareness training and follow strict data handling procedures.
Incident Response
We maintain a comprehensive incident response plan to quickly address any security events.
Vendor Security
We carefully vet all third-party vendors and require them to meet our security standards.
Secure Development
Our development process includes security reviews, code scanning, and vulnerability testing.
Continuous Monitoring
We monitor our systems 24/7 for unusual activity and potential security threats.
Have questions about our security practices? Contact our security team