Security at Exord Systems

Last Updated: January 31, 2026

At Exord Systems, security is foundational to everything we build. Our Decision Compute Infrastructure™ is designed to protect enterprise data and ensure operational integrity at scale.

1. Security Overview

We take a multi-layered approach to security, combining robust technical controls with rigorous operational practices. Our goal is to provide a platform that enterprises can trust with their most critical decision-making processes.

On-Premise Sovereignty

Our software is designed to run within your infrastructure, ensuring you maintain full control over your data residency and security posture.

Defense in Depth

We implement security controls at every layer—from code and application logic to infrastructure and operational workflows.

2. Data Security

2.1 Encryption

We believe in strong encryption as a fundamental right for enterprise data:

  • Data in Transit: All communications between system components and external APIs use TLS 1.3 or higher.
  • Data at Rest: All persistent data is encrypted using industry-standard AES-256 encryption.
  • Key Management: We support integration with enterprise Key Management Systems (KMS) for customer-managed keys (CMK).

2.2 Data Residency

With on-premise deployment, your data never leaves your environment. You maintain full control over where your data is stored and processed, complying with your internal policies and regional regulations.

3. Infrastructure & Operational Security

3.1 System Isolation

The Exord platform is designed to run in isolated environments. We provide detailed guidelines for network segmentation, firewall configurations, and least-privilege access controls to ensure the platform is hardened within your infrastructure.

3.2 Operational Practices

Our internal operations follow strict security standards:

  • Multi-Factor Authentication (MFA) required for all internal systems.
  • Regular security awareness training for all employees.
  • Strict background checks for all personnel with access to source code or support systems.
  • Continuous monitoring and automated alerting for internal infrastructure.

4. Product & Application Security

We integrate security into the software development lifecycle (SDLC):

MeasureDescription
Code ScanningContinuous SAST/DAST scanning of our codebase for vulnerabilities.
Third-Party AuditsRegular security assessments by independent third-party experts.
Dependency ManagementAutomated monitoring and patching of third-party libraries and dependencies.
Access ControlsRobust Role-Based Access Control (RBAC) within the application.

5. Compliance

Exord Systems is committed to meeting the highest standards of regulatory and industry compliance:

SOC 2 Type II (In Progress)

6. Vulnerability Disclosure Program

We welcome reports from the security research community. If you believe you have found a security vulnerability in our platform, please report it to us via our coordinated vulnerability disclosure process.

Please send detailed information about the vulnerability to admin@exord.systems. We will acknowledge your report promptly and keep you updated on our progress toward a resolution.

7. Security Contact Information

For security-related inquiries or to report an incident, please contact our security team:

Security Engineering

Email: admin@exord.systems

Exord Systems Inc.

8 The Green, STE R
Dover, DE 19901, USA