Trust center

Security

Defense-in-depth architecture with customer-controlled keys.

Security reviews move faster when every control maps to a demo artifact—logs, diagrams, and attestation-ready exports.

Use the storyline below with auditors or red teams; each step references capabilities you can reproduce inside the portal sandbox.

Security assurance demo

Walk reviewers through encryption ownership, blast-radius reduction, and evidence retention without sharing live customer data.

1

Prove key custody

Show how keys never leave customer-controlled envelopes and how rotation is orchestrated.

2

Stress immutability

Demonstrate cooling windows, legal holds, and deletion guardrails against compromised admins.

3

Export evidence

Generate tamper-evident activity bundles for regulators or cyber insurers.

portal.backupfort.net/security
0Plaintext egress
24/7Telemetry
100%Signed ops

Representative posture metrics for assurance workshops.

Encryption

AES-256 with per-tenant key material derived on-device.

Zero-knowledge

BackupFort operators cannot access customer file payloads.

Immutability

Object lock policies reduce ransomware blast radius.

Compliance

SOC 2 Type II program in progress with auditable controls.