Security

Security is
architecture,
not a feature

Every layer of NudgeX is designed to protect your data and keep outreach under your control. No afterthoughts. No shortcuts.

System StatusALL SYSTEMS OPERATIONAL
Identity & accessMulti-factorVERIFIED
Data encryption256-bit AESACTIVE
Data isolationPer-workspaceENFORCED
Content guardrailsConfigurableACTIVE
Human approvalRequiredENFORCED
Audit loggingImmutableRECORDING
Defense in depth

Five layers between your data and the outside world

Every request passes through each layer. No shortcuts. No bypasses.

AuthenticationVerified identity
Encryption256-bit AES
Workspace isolationPer-workspace
GuardrailsRule enforcement
Human approvalRequired always
Your Data
Security pillars

Six structural guarantees

These are architectural decisions, not configuration options. They can't be toggled off.

01
CORE PRINCIPLE

Human approval on every send

No message leaves your workspace without an explicit click. The AI drafts and recommends — your team reviews and decides. This is by design, not a temporary limitation.

02
ENCRYPTION

Bank-grade encryption at rest

All sensitive credentials are encrypted using 256-bit AES — the same standard used by financial institutions. Each token is individually secured with unique keys that are never stored alongside your data.

03
DATA ISOLATION

Your data is structurally separated

Every query and API call is scoped to your workspace at the infrastructure level. This isn't a software toggle — it's a structural boundary. No misconfiguration can expose your data to another customer.

04
RULE ENFORCEMENT

Guardrails your team can't bypass

Tone presets, restricted phrases, and follow-up frequency limits are enforced automatically on every draft — whether generated by AI or edited by your team. Rules are checked server-side before any message can be sent.

05
INBOX CONNECTION

No passwords, no access keys

NudgeX never sees or stores your email password. We connect through your provider's official authorization system with read and send permissions only. Revoke access anytime from your email settings.

06
AUDIT & COMPLIANCE

Every action logged, nothing deleted

Every draft, edit, approval, send, and schedule is recorded with timestamps and context. The log is append-only — entries cannot be modified or removed, giving your compliance team a reliable audit trail.

Trust commitments

Promises we make — and enforce

These aren't aspirations. They're constraints we build around.

No autonomous sending — ever

Every outbound message requires a human click. No scheduling without approval. No batching without review. Your team stays in full control.

No silent data collection

NudgeX reads your email threads to surface follow-ups. Nothing more. Your data is never used for model training or behavioral profiling.

No black-box decisions

Every recommendation shows why: why this thread, why now, why this priority. Your team always understands the reasoning behind each suggestion.

No credential storage

We connect to your inbox through your email provider's official authorization. No passwords stored. Fully revocable from your provider's settings.

Infrastructure

Standards and compliance

For security teams and technical reviewers — here's what's under the hood.

AreaStandardWhat this means
Authentication
Multi-factor, SSO-ready
Your team signs in securely with enterprise identity management and session protection
Encryption
256-bit AES (bank-grade)
All sensitive data encrypted at rest using the same standard as financial institutions
Data isolation
Per-workspace architecture
Your data is structurally separated from every other customer at the database level
Rate protection
Distributed throttling
Automated protection against abuse, unauthorized bulk access, and denial-of-service
Payment security
PCI-DSS Level 1
Billing handled through the payment industry's highest compliance standard
Monitoring
Real-time detection
Issues are detected, logged, and flagged before they can impact your team

Your follow-ups are safe with NudgeX

Five security layers. Human approval on every send. Complete audit trail. Start following up with confidence.