Enterprise-grade security
Built for organizations that require complete auditability, strict data isolation, and compliance-ready architecture. Procurement-safe by design.
Security at every layer
From data encryption to audit trails, every aspect of Tirdad is designed for enterprise and government requirements.
- Immutable event log
- Point-in-time state reconstruction
- Detailed change attribution
- Exportable audit reports
- Logical tenant separation
- Tenant-scoped API keys
- Isolated processing queues
- Per-tenant encryption keys
- Predefined admin roles
- Custom permission sets
- API key scoping
- Action-level permissions
- Distributed tracing
- Request correlation IDs
- Event lineage tracking
- Debug mode for development
- TLS 1.3 for transit
- AES-256 at rest
- PSP-managed card data
- Key rotation support
- Scoped API keys
- Rate limiting
- IP allowlisting
- Webhook signature verification
Meeting regulatory requirements
We take compliance seriously. Tirdad is designed to help you meet your regulatory obligations.
SOC 2 Type II
Security, availability, and confidentiality controls
GDPR
EU data protection and privacy regulation
PCI DSS
Payment card data handled by certified PSP partners
Data Residency
Deploy in your preferred geographic region
Flexible deployment models
Choose the deployment model that fits your security and compliance requirements.
Cloud (Multi-Tenant)
Fully managed SaaS deployment with tenant isolation. Fastest time to value with automatic updates.
Dedicated Cloud
Single-tenant cloud deployment in your preferred region. Enhanced isolation for regulated industries.
On-Premise / VPC
Deploy within your own infrastructure or VPC. Full control for maximum data sovereignty.
Security Documentation
Download our security materials and compliance documentation.
Security Whitepaper
Comprehensive overview of Tirdad's security architecture, encryption standards, and compliance framework.
SOC 2 Type II Report
Request access to our SOC 2 Type II audit report (via Flexprice) under NDA.
Penetration Test Summary
Annual third-party penetration testing results summary available upon request.

Ready to discuss your security requirements?
Our team can provide security documentation, compliance questionnaire assistance, and custom deployment discussions.
