Security and Trust
Your data security is foundational to everything we build. Here is how we protect it.
How we handle your data
BlockMatrix treats your data with the same care you would. Every piece of information that enters the platform is protected by multiple layers of security, from the moment it arrives to the moment it is accessed.
Encrypted in transit and at rest
All data is encrypted using TLS 1.3 during transmission and AES 256 encryption at rest. Your information is protected whether it is moving between systems or stored in our infrastructure.
No data sharing with third parties
We never sell, rent, or share your data with third parties for marketing or advertising purposes. Data is only processed by the services required to deliver the functionality you configured.
Data residency options
Choose where your data is stored. We offer regional data residency options to help you meet local compliance requirements and keep your information within the jurisdictions that matter to your business.
Granular controls at every level
Security is not just about encryption. It is about making sure the right people have access to the right data at the right time, and that every action is traceable.
Role Based Access Control
Granular permissions per user, team, and client. Define exactly who can view data, create workflows, approve actions, and manage integrations within each workspace.
Audit Logs
Complete activity trail for every action taken. Every login, configuration change, approval decision, and agent execution is recorded with timestamps, user identity, and context.
Approval Workflows
Human review required for sensitive operations. Configure thresholds for financial transactions, outbound volume, and data exports so nothing critical executes without explicit sign off.
Session Management
Automatic timeouts and device management. Sessions expire after configurable periods of inactivity, and administrators can view and revoke active sessions across all devices.
Industry standard encryption at every layer
We use proven cryptographic standards to ensure your data remains confidential and tamper proof throughout its lifecycle.
TLS 1.3 in Transit
All connections between your browser, our API, and third party integrations are protected by TLS 1.3, the latest transport layer security protocol. Older protocols are disabled.
AES 256 at Rest
Data stored in our databases and file systems is encrypted using AES 256 bit encryption. Even in the unlikely event of physical media access, your data remains unreadable.
Key Rotation
Encryption keys are rotated on a regular schedule. Automated key management ensures that compromised keys have a limited window of exposure and that rotation happens without downtime.
AI with human checkpoints
AI agents are powerful tools, but they are not autonomous. Every critical decision includes a human checkpoint. Guardrails prevent unwanted actions. Suppression rules protect sensitive contacts. Quiet hours respect boundaries. And every action is logged for review.
This philosophy extends across the entire platform. Whether an agent is sending an outreach sequence, categorizing a bank transaction, or generating a financial report, the same governance model applies. You define the boundaries, the AI works within them, and humans step in whenever the situation calls for judgment.
Questions about security?
Our team is happy to walk you through our security practices, compliance posture, and data handling policies.