E
c
li
p
s
e
I
n
t
e
l

Security

At Eclipse Intel, security is not just what we provide to our customers—it's fundamental to how we operate. We implement industry-leading security practices to protect your data and ensure the integrity of our threat intelligence platform.

Data Protection

Our comprehensive data protection measures include:

  • End-to-end encryption for data in transit and at rest
  • AES-256 encryption for stored data
  • TLS 1.3 for secure communications
  • Regular security audits and penetration testing
  • Secure data centers with 24/7 monitoring

Access Control

We implement strict access controls to ensure data security:

  • Multi-factor authentication (MFA) for all accounts
  • Role-based access control (RBAC)
  • Regular access reviews and audits
  • Principle of least privilege access
  • Session management and timeout controls

Infrastructure Security

Our infrastructure is built on secure foundations:

  • ISO 27001 certified data centers
  • SOC 2 Type II compliance
  • Regular vulnerability assessments
  • Automated security monitoring and alerting
  • Distributed denial-of-service (DDoS) protection
  • Web application firewall (WAF)

Incident Response

We maintain a dedicated security incident response team that monitors for threats 24/7. In the event of a security incident, we follow established protocols to contain, investigate, and remediate issues quickly while keeping affected parties informed.

Compliance & Certifications

Eclipse Intel maintains compliance with:

  • GDPR (General Data Protection Regulation)
  • SOC 2 Type II
  • ISO 27001
  • CCPA (California Consumer Privacy Act)

Security Best Practices for Users

We recommend the following best practices for our users:

  • Enable multi-factor authentication on your account
  • Use strong, unique passwords
  • Keep your software and systems updated
  • Be cautious of phishing attempts
  • Report suspicious activity immediately

Responsible Disclosure

If you discover a security vulnerability in our platform, please report it responsibly to [email protected]. We appreciate the security research community's efforts and will respond promptly to valid reports.

Questions?

For security-related inquiries, contact our security team at [email protected]