Security
Superproxy is designed with security, reliability, and operational resilience at its core. This page provides an overview of the practices and controls we use to help safeguard your workspaces, customer data, and AI-driven workflows.
While no platform can guarantee absolute security, we implement layered technical, organizational, and procedural measures to reduce risk and protect your information.
1. Infrastructure & Network Security
Superproxy runs on modern cloud infrastructure that is designed for high availability and security. Network-level protections, isolation mechanisms, and hardened configurations help reduce the attack surface and protect customer workloads.
- Segmented environments for development, staging, and production workloads where applicable.
- Principle of least privilege applied to service accounts, infrastructure access, and administrative tooling.
- Use of secure connections and access controls for databases, messaging components, and storage.
2. Application & Workspace Security
Superproxy is built with security-conscious development practices. We aim to minimize data exposure and give workspace owners strong configuration control.
- Authentication flows designed to protect account access, including secure session handling.
- Role-based permissions to control who can manage contacts, quotations, calls, analytics, and workspace settings.
- Input validation, parameterization, and other safeguards to reduce common web application risks.
3. Data Protection & Privacy Alignment
Security and privacy are closely tied. Our technical controls are complemented by privacy-aware processes to help you meet your obligations to customers and partners.
- Logical separation of workspaces so one customer's data is not visible to another.
- Limited access to production data, granted only to authorized personnel with a clear operational need.
- Processes to address data subject requests and retention configurations, as described in our Privacy Policy.
4. AI, Voice & Telephony Security
AI-driven calls, voice cloning, and automated communication pipelines are powerful capabilities. We treat them as security-sensitive components.
- Scoped keys and credentials for telephony, email, and AI services, with rotation and revocation procedures.
- Controls to restrict which data is included in prompts, call scripts, and AI interactions where practicable.
- Monitoring for unusual activity patterns, such as abnormal call volumes or scripted behavior inconsistent with expected use.
5. Operational & Organizational Security
Security is supported by internal processes, training, and controls designed to reduce the likelihood and impact of issues.
- Access reviews and change management processes for critical infrastructure and configuration.
- Internal guidelines covering handling of customer data and use of administrative tools.
- Logging and monitoring to support incident detection, investigation, and response.
6. Your Security Responsibilities
Security is a shared responsibility between Superproxy and our customers. To help maintain a strong security posture, we recommend that you:
- Use strong, unique credentials for workspace owners and administrators.
- Regularly review user access, deprovision former team members, and adjust permissions as roles change.
- Configure telephony, AI, and email features in line with your organization's security and compliance requirements.
- Protect your own devices and networks with up-to-date security software and best practices.
7. Incident Response
If we become aware of a security incident that affects your data, we will investigate promptly, take appropriate remediation steps, and, where required, notify impacted customers and relevant parties in line with applicable obligations.
8. Questions About Security
If you have questions about Superproxy's security practices or require additional information for your internal reviews, you can contact our team using the details provided within the application or on our website.