Security & Privacy

Security & Privacy

Learn about Nyxhora's comprehensive security measures and privacy practices.

Security Overview
How Nyxhora protects your data

At Nyxhora, security is a top priority. We've implemented comprehensive measures to protect your data and ensure the platform remains secure and reliable.

Infrastructure Security

  • Cloud Infrastructure: Hosted on enterprise-grade cloud platforms with built-in security and redundancy
  • Network Security: Multiple layers of firewalls, intrusion detection, and DDoS protection
  • Physical Security: Data centers with 24/7 monitoring, biometric access controls, and environmental safeguards
  • Redundancy: Distributed architecture with automatic failover to prevent data loss

Data Protection

  • Encryption in Transit: All data transmitted using TLS 1.2+ with strong cipher suites
  • Encryption at Rest: All stored data is encrypted using AES-256 encryption
  • Backup Systems: Automated, regular backups with secure off-site storage
  • Disaster Recovery: Comprehensive disaster recovery plans with regular testing

Application Security

  • Secure Development: Following secure coding practices and OWASP guidelines
  • Regular Testing: Continuous security testing, including penetration tests and vulnerability scans
  • Dependency Management: Regular updates to all software dependencies to address security vulnerabilities
  • Bug Bounty Program: Collaboration with security researchers to identify and fix vulnerabilities
Access Control
Managing who can access your data

Nyxhora provides robust access control features to ensure only authorized users can access your workspace:

Authentication

  • Strong Password Policies: Enforcing secure password requirements
  • Multi-Factor Authentication (MFA): Additional security layer beyond passwords
  • Single Sign-On (SSO): Integration with enterprise identity providers (available on Business and Enterprise plans)
  • Session Management: Automatic session timeouts and device verification

Permission Levels

Nyxhora offers granular permission controls at multiple levels:

  • Workspace Roles:
    • Owner: Full control over the workspace, including billing and deletion
    • Admin: Can manage users, settings, and all content
    • Member: Can create and edit content based on permissions
    • Guest: Limited access to specific content only
  • Page-Level Permissions: Control who can view, comment, edit, or manage specific pages
  • Group Permissions: Create custom groups with specific access rights
  • External Sharing: Control whether content can be shared outside your organization

Access Monitoring

  • Audit Logs: Comprehensive logs of all access and actions within your workspace
  • Suspicious Activity Detection: Automated alerts for potentially unauthorized access attempts
  • Login History: View all devices and locations that have accessed your account
  • Admin Notifications: Alerts for important security events
Privacy Practices
How we handle and protect your information

Nyxhora is committed to transparent privacy practices and giving you control over your data:

Data Ownership

  • Your Data Remains Yours: You retain full ownership of all content you create in Nyxhora
  • No Data Mining: We don't analyze your content to sell insights or target advertising
  • Data Portability: Export your data at any time in standard formats
  • Data Deletion: When you delete content, it's removed from our active systems

Privacy Controls

Manage how your information is used:

  • Privacy Settings: Control what information is visible to others
  • Consent Management: Choose what data is collected for product improvement
  • Communication Preferences: Control what emails and notifications you receive
  • Third-Party Integrations: Manage what external services can access your data

Compliance

Nyxhora adheres to global privacy regulations and standards:

  • GDPR Compliance: Meeting European data protection requirements
  • CCPA Compliance: Respecting California consumer privacy rights
  • SOC 2 Type II: Independent verification of our security controls
  • Privacy Shield: Framework for EU-US and Swiss-US data transfers
  • Regular Audits: Third-party verification of our privacy practices

Privacy Documentation

For more detailed information, please refer to our official documentation:

  • Privacy Policy: Comprehensive details about how we handle your data
  • Terms of Service: The legal agreement governing use of Nyxhora
  • Data Processing Addendum: Available for enterprise customers
  • Subprocessor List: Third-party services we use to provide our service
Security Best Practices
Recommendations for keeping your workspace secure

While Nyxhora implements robust security measures, following these best practices will help ensure your workspace remains secure:

Account Security

  • Enable MFA: Require multi-factor authentication for all users
  • Strong Passwords: Use unique, complex passwords and consider a password manager
  • Regular Password Changes: Update passwords periodically, especially for admin accounts
  • Secure Email: Ensure the email addresses linked to accounts are secure
  • Device Security: Keep devices locked when not in use and use secure networks

Access Management

  • Regular Access Reviews: Periodically review who has access to your workspace
  • Principle of Least Privilege: Grant only the permissions users need to do their work
  • Offboarding Process: Immediately remove access when team members leave
  • Guest Access Expiration: Set time limits for temporary access
  • Careful External Sharing: Review and limit what content is shared outside your organization

Content Security

  • Sensitive Information: Be mindful of where you store highly sensitive data
  • Regular Backups: Export important content periodically as an additional backup
  • Link Sharing: Use expiring links when sharing sensitive content
  • Workspace Structure: Organize content to make permission management easier
  • Content Classification: Label sensitive content to ensure proper handling

Security Monitoring

  • Review Audit Logs: Regularly check for unusual activity
  • Security Notifications: Ensure administrators receive and review security alerts
  • Integration Review: Periodically audit connected applications and services
  • Security Training: Educate team members about security best practices
  • Incident Response Plan: Develop a plan for responding to potential security incidents
Enterprise Security Features
Advanced security capabilities for organizations

Nyxhora Enterprise offers additional security features designed for organizations with advanced requirements:

Advanced Authentication

  • SAML SSO: Enterprise-grade single sign-on with SAML 2.0 support
  • SCIM Provisioning: Automated user provisioning and deprovisioning
  • Custom Password Policies: Set organization-specific password requirements
  • Mandatory MFA: Enforce multi-factor authentication for all users
  • IP Restrictions: Limit access to specific IP addresses or ranges

Advanced Permissions

  • Domain Verification: Verify ownership of your domain for enhanced security
  • Private Workspaces: Restrict workspace discovery within your organization
  • Custom Roles: Create organization-specific permission sets
  • Content Policies: Define and enforce rules for content sharing
  • Admin Roles: Delegate specific administrative functions

Compliance & Governance

  • Enhanced Audit Logs: More detailed activity tracking with longer retention
  • Data Residency: Choose where your data is stored (select regions)
  • Legal Hold: Preserve content for legal or compliance purposes
  • DLP Integration: Connect with Data Loss Prevention systems
  • Compliance Manager: Tools to help manage regulatory compliance

Enterprise Support

  • Dedicated Security Team: Specialized support for security concerns
  • Security Reviews: Regular security assessments and recommendations
  • Custom Security Configurations: Tailored security settings for your organization
  • Priority Incident Response: Expedited handling of security incidents
  • Compliance Documentation: Assistance with security compliance documentation