← Back to Home

Security

Last updated: March 1, 2026

Security is foundational to everything we build at Treeo. We understand that you are trusting us with your most sensitive business data, and we take that responsibility seriously.

Infrastructure Security

Treeo's platform is hosted on industry-leading cloud infrastructure with multiple layers of protection:

Data Encryption

All data stored and transmitted through Treeo is encrypted using modern, industry-standard algorithms:

Access Controls

We apply the principle of least privilege throughout our systems:

Application Security

We follow secure development practices throughout the software lifecycle:

We never execute raw queries against your database on behalf of users without an explicit, auditable request. All query execution is sandboxed, logged, and tied to authenticated sessions.

Data Isolation

Each customer's data is logically isolated from other customers' data. Our multi-tenant architecture ensures that one customer cannot access another's data under any circumstances. Query results and cached data are scoped strictly to the authenticated workspace that requested them.

Incident Response

We maintain a formal incident response process:

Compliance

We are committed to meeting the compliance requirements of our customers. Our security programme is designed to align with:

Responsible Disclosure

We welcome reports from the security community. If you discover a potential vulnerability in our platform, please report it responsibly to security@treeo.ai. We ask that you:

We will acknowledge your report within 48 hours and keep you informed as we investigate and remediate the issue.

Contact

For security-related questions or to report a vulnerability, please contact our security team:

For general privacy questions, see our Privacy Policy.