← Back to Home

Security

Last Updated: January 20, 2026

Our Commitment: Security isn't just a feature - it's the foundation of everything we build. Your data is protected with enterprise-grade security, encryption, and monitoring.

Security Overview

Juron implements a comprehensive security program covering:

1. Infrastructure Security

1.1 Cloud Hosting

☁️

Amazon Web Services (AWS)

SOC 2 Type II, ISO 27001, PCI DSS Level 1 certified infrastructure

1.2 Network Security

1.3 Server Security

2. Data Encryption

2.1 Encryption at Rest

Data Type Encryption Key Management
Database (PostgreSQL) AES-256 AWS KMS
File Storage (S3) AES-256 AWS KMS
Backups AES-256 AWS KMS
Application Secrets AES-256 AWS Secrets Manager

2.2 Encryption in Transit

2.3 Key Management

3. Access Control

3.1 Authentication

3.2 Authorization

3.3 Employee Access

4. AI & Model Security

4.1 AI Model Protection

4.2 Prompt Injection Prevention

4.3 Third-Party AI APIs

Provider Usage Data Retention
OpenAI GPT-4 for language tasks Zero retention (API agreement)
Anthropic Claude for reasoning tasks Zero retention

Enterprise Privacy: All API calls use zero-retention agreements. Your data is NOT used to train third-party models.

5. Application Security

5.1 Secure Development

5.2 Vulnerability Management

5.3 Security Headers

6. Monitoring & Incident Response

6.1 Security Monitoring

6.2 Incident Response

Response Times:

Incident Process:

  1. Detection & triage
  2. Containment & isolation
  3. Investigation & root cause analysis
  4. Remediation & recovery
  5. Post-incident review
  6. Customer notification (if data affected)

6.3 Breach Notification

In the event of a data breach:

7. Data Protection & Privacy

7.1 Data Segregation

7.2 Data Retention

7.3 Data Portability

8. Compliance & Certifications

SOC 2 Type II

In Progress

Q3 2026

GDPR

Compliant

Active

CCPA

Compliant

Active

ISO 27001

Planned

Active

8.1 Privacy Frameworks

8.2 Enterprise Compliance

Available for Enterprise customers:

9. Business Continuity

9.1 Availability

9.2 Disaster Recovery

10. Physical Security

10.1 Data Center Security (AWS)

10.2 Office Security

11. Vendor Security

11.1 Third-Party Risk Management

All vendors undergo security review:

11.2 Sub-Processors

Full list available in our Privacy Policy. Key vendors:

12. Security Best Practices for Users

12.1 Recommendations

12.2 Reporting Security Issues

Found a vulnerability? We appreciate responsible disclosure:

Please do NOT:

13. Security Roadmap

Q1-Q2 2026

Q3-Q4 2026

14. Contact Security Team

General Inquiries:
security@juron.ai

Vulnerability Reports:
security@juron.ai
PGP Key: Download

Compliance Questions:
compliance@juron.ai

Data Protection Officer:
dpo@juron.ai

Questions about our security? We're happy to discuss our security practices. Enterprise customers can request detailed security documentation and arrange security calls.

Contact Security Team →

Back to Home | Privacy Policy | Terms of Service