Skip to content

How Quanscient ensures data privacy and protection of your simulation data

Security is at the core of our products — helping our customers keeping their data safe is our top priority.

Quanscient Allsolve

Here are the core security features for keeping your data safe

Data encryption in transit and at rest

All customer data, in addition to object-storage, temporary storage and databases are encrypted at rest.

We use TLS 1.2 or higher everywhere data is transmitted over potentially insecure networks. We renew our SSL certificates regularly and we restrict the allowed ciphers to well-known secure ciphers only.

This means your data is protected both during transmission and while stored on our servers.

Authentication and access control

Quanscient Allsolve utilizes a robust authentication system with strong password requirements and optional two-factor authentication. A granular permission system ensures users only have the access they need.

Secure secret management

All our encryption keys are managed via Key Management System (KMS). Using KMS prevents direct access to the keys by any individuals, including employees of Quanscient. The keys are used for encryption and decryption via KMS APIs only.

Application secrets are stored encrypted and access to these values is limited to only the services that absolutely need them.

Isolated cloud environment

Quanscient Allsolve operates within an isolated cloud environment, segregated from public networks by strict network firewall rules.This means that your applications and data are completely separated from other users and potential vulnerabilities.

Core security features in Quanscient Allsolve

Here are the core security features for keeping your data safe.

check-circle
Data encryption in transit and at rest

All customer data, in addition to object-storage, temporary storage and databases are encrypted at rest.

We use TLS 1.2 or higher everywhere data is transmitted over potentially insecure networks. We renew our SSL certificates regularly and we restrict the allowed ciphers to well-known secure ciphers only.

This means your data is protected both during transmission and while stored on our servers.

check-circle
Authentication and access control

Quanscient Allsolve utilizes a robust authentication system with strong password requirements and optional two-factor authentication.

A granular permission system ensures users only have the access they need.

check-circle
Secure secret management

All our encryption keys are managed via Key Management System (KMS). Using KMS prevents direct access to the keys by any individuals, including employees of Quanscient. The keys are used for encryption and decryption via KMS APIs only.

Application secrets are stored encrypted and access to these values is limited to only the services that absolutely need them.

check-circle
Isolated cloud environment

Quanscient Allsolve operates within an isolated cloud environment, segregated from public networks by strict network firewall rules.

This means that your applications and data are completely separated from other users and potential vulnerabilities.

Quanscient is SOC 2 Type II certified

Quanscient is proud to be SOC 2 Type II certified as of November 2024, demonstrating our ongoing commitment to the highest standards of data security and privacy. We are also working towards ISO 27001 certification in 2025 to further enhance our security practices.

Your data is in safe hands with us. If you’d like to review our SOC 2 Type II report or have any questions about our security measures, please contact us.

 

SOC 2-1

 

Trusted by both industry and academia

Logo of UK Atomic Energy Authority
Logo of Infineon
Logo of Proxima Fusion
Logo of Imec
Logo of Paul Scheffer Institut
Data privacy and compliance

We adhere to strict privacy standards and comply with relevant regulations

folder-shield
Separately stored PII

Personally Identifiable Information (PII) is stored separately to ensure easy retrieval or removal upon user request.

globe
Regional data storage

We store your data in your region (e.g., EU customer data in the EU).

check-done-01
Regulatory compliance

We comply with required GDPR requirements and other relevant regional regulations where we do business.

Enterprise security

Strict security measures are in place in the day-to-day operations of Quanscient to ensure a robust and comprehensive security framework

shield-tick-1 Endpoint protection All of our devices are equipped with anti-malware protection, disc-encryption, automatic screen-locking, automatic software updates and we utilize password managers to prevent leaking access.  
shield-tick-1 Secure remote access As a cloud-first company, all the data we handle is securely stored and backed-up by our carefully selected, world-class vendors, who are committed to security. All connections to the services we use are encrypted using standard techniques.  
shield-tick-1 Identity and access management We utilize a security compliance management software to monitor the access rights and identities in the services we use. These are reviewed at least annually and any access to services needs to be requested via internal system and reviewed by the system owners before allowing access.  
shield-tick-1 Security education We require our employees to complete annual security training. In addition to that, we have established a Product Security Team that has representatives from all of our teams. In their regular meetings, latest security information is shared and passed on to the teams by these representatives. In addition, we also follow security incidents and notify our employees on our internal communication channels about new threats or required measures.  
shield-tick-1 Vendor security We have defined a policy for evaluating risks for any new service vendors we might use. We check them for compliance and thoroughly assess the risk and define the scope of usage of the services.  

FAQ

Who owns my data? Do you have access to it? You, the customer, unequivocally own your data.  Quanscient acts strictly as a data processor, securely storing and managing your data according to our agreement and privacy policy. We cannot access your data without your explicit permission, even for internal purposes.  Access is only granted if you provide consent, for example, to allow our technical support team to assist you with a specific issue.
Where is my data stored, specifically, and what data residency options do you offer? You have control over where your data is stored. We provide regional options to meet your compliance and data sovereignty requirements. Contact us to discuss your preferences and available regions.
How do you handle data backups and disaster recovery? We perform regular backups of your data and our systems. These backups are encrypted and stored securely. Our disaster recovery plan ensures business continuity in the event of an outage, with clearly defined recovery time objectives (RTOs) and recovery point objectives (RPOs). Contact us for specifics.
What is your vulnerability disclosure policy? How can I report a security vulnerability?

We welcome responsible vulnerability disclosures. Please report any potential security issues through the security concern form below or via email to security@quanscient.com. Provide as much detail as possible, including steps to reproduce the issue. We will acknowledge your report and investigate promptly.

Do you conduct penetration testing, and how often?

Yes, we conduct regular penetration testing, both internally and by independent third-party security experts. We perform automated scans frequently and manual penetration tests at least quarterly, covering all areas of our product and cloud infrastructure.

What security certifications do you hold beyond SOC 2 Type II?

We are currently SOC 2 Type II certified and are actively pursuing ISO 27001 certification. We continuously evaluate other relevant certifications and frameworks to maintain the highest security standards.

How is my data isolated from other customers' data?

Quanscient Allsolve operates in an isolated cloud environment.  Each customer's data is logically separated and protected by strict access controls and firewall rules, preventing unauthorized access between customer environments.

Looking to report a security concern?

Contact us via this form, and someone from our security team will get back to you within 1 business day.