Nexus helps teams manage infrastructure through a unified browser-based workspace for SSH, SFTP, file editing, databases, logs, and containers. Our trust center gives customers a clear view into how we protect systems, handle data, and operate reliably.
We build Nexus around least privilege, layered defense, and operational accountability.
Unique identities, role-based access controls, privileged access restrictions, and support for MFA help ensure only authorized users can access systems and workflows.
Operational events, administrative actions, and platform activity can be logged to improve visibility, support investigations, and strengthen customer accountability.
Sensitive credentials and configuration secrets should be stored using secure secrets-management practices and separated from frontend exposure wherever possible.
Nexus is designed with controls that support modern buyer expectations and enterprise security reviews.
Nexus is designed in alignment with SOC 2 Trust Services Criteria, with emphasis on security, availability, and confidentiality controls including access control, monitoring, change management, incident response, and data protection.
Core infrastructure should be deployed on established cloud providers and supported by documented vendor review, backup processes, and security configuration standards.
Operational maturity matters as much as feature depth. Nexus emphasizes continuity, observability, and recoverability.
Service health, critical workflows, and infrastructure components should be continuously monitored with alerts routed to responsible operators.
Backups, restore validation, and documented recovery procedures help reduce recovery time and support business continuity goals.
Incidents should be identified, contained, remediated, documented, and reviewed through a defined response process with clear escalation paths.
Use these entries as the basis for a gated customer document request workflow.
Plain-language answers to the questions enterprise buyers ask most often.
Nexus can be described as built around SOC 2-aligned controls. Replace this answer with your current status once a formal audit is complete, such as "SOC 2 Type I completed" or "SOC 2 Type II in progress."
Customer data should be protected with encryption in transit, encryption at rest where applicable, controlled access, monitoring, and secure operational processes.
Yes. Nexus is positioned around role-based access so organizations can limit user actions based on responsibilities and operational need.
Use the document request area above or direct inquiries to your security contact address. Many teams gate access to deeper documentation behind an NDA or buyer verification workflow.
Nexus can support enterprise evaluations with architecture overviews, policy summaries, questionnaire responses, and trust documentation tailored to your sales process.