Security
Last updated: February 28, 2026
Trilect is built with security as a foundational requirement. This page outlines the technical and operational measures we employ to protect this platform and the information submitted through it.
Data Protection Standards
All data handled by Trilect is treated with strict confidentiality. We follow industry-standard data protection practices, including data minimisation — collecting only what is necessary — and limiting internal access to information on a need-to-know basis.
We do not store deal data, financial models, or proprietary information submitted during private demonstrations. Contact form submissions are retained only as long as operationally necessary.
Encryption
All data transmitted between your browser and Trilect infrastructure is encrypted in transit using TLS 1.2 or higher. HTTPS is enforced across all pages and API endpoints. Data at rest is protected using AES-256 encryption where applicable.
Access Controls
Access to Trilect systems and data is restricted to authorised personnel only. We enforce role-based access controls, multi-factor authentication for all internal systems, and maintain audit logs for access to sensitive data and infrastructure.
Hosting Infrastructure
This platform is deployed on Cloudflare Pages, a globally distributed edge network with enterprise-grade DDoS protection, Web Application Firewall (WAF), and automatic SSL certificate management. Form processing is handled by Cloudflare Workers, which operate within Cloudflare's secure, isolated execution environment.
Cloudflare infrastructure is SOC 2 Type II certified and compliant with ISO 27001. Their security posture and data handling practices are governed by their own published security documentation.
Responsible Disclosure
If you believe you have discovered a security vulnerability in this platform, we ask that you report it to us responsibly before any public disclosure. Please contact us at security@trilect.com with a clear description of the issue, steps to reproduce it, and any relevant technical detail.
We will acknowledge receipt within two business days and work to resolve confirmed vulnerabilities promptly. We appreciate responsible disclosure and will not pursue legal action against researchers who act in good faith.