Security
Last updated: 10.05.2026
Varox is designed as a cloud platform for demand planning, forecasting, delivery planning, and operational analytics. We understand that customers may upload business-critical operational data, and we take platform security seriously.
This page provides a high-level overview of the technical and organizational measures used to help protect the service and customer data. How we process personal information is described in our Privacy Policy.
Infrastructure and hosting
Varox is operated using modern cloud and server infrastructure with HTTPS/TLS encryption enabled for web traffic and API communication.
Access to infrastructure and operational systems is restricted to authorized administrators only.
We monitor platform stability, application errors, and operational health to maintain reliability and detect abnormal activity.
Authentication and account security
Varox uses authenticated accounts for access to the platform.
Security measures include:
- password hashing
- HTTP-only authentication cookies
- secure session handling
- tenant-scoped access controls
- verification flows for account actions where applicable
Users are responsible for maintaining the security of their own credentials and devices.
Tenant isolation
Varox is designed as a multi-tenant platform with logical separation between customer workspaces.
Application-level access controls are used to ensure users can only access data associated with their own tenant or organization.
Data handling
Uploaded datasets and imported operational data remain under the control of the customer.
Varox processes uploaded data only to provide requested functionality such as:
- forecasting
- delivery planning
- reporting
- inventory analytics
- integrations
We do not sell uploaded business data.
We do not use customer datasets to train unrelated public AI models.
Encryption and transport security
Connections to the platform are protected using HTTPS/TLS encryption.
Sensitive credentials and authentication-related information are stored using secure industry-standard practices where applicable.
Logging and monitoring
Varox maintains operational logs and monitoring systems to:
- diagnose platform issues
- detect abuse or unauthorized activity
- improve reliability and performance
- support incident investigation
Logs are retained only for reasonable operational and security purposes.
Integrations and external providers
Varox may use carefully selected third-party providers for infrastructure, billing, email delivery, monitoring, and optional AI functionality.
These providers process data only as necessary to operate the service.
Availability and backups
We aim to maintain reliable availability and operational continuity.
Infrastructure backups and recovery procedures may be used for operational resilience and disaster recovery purposes.
However, customers are responsible for maintaining their own exports and archival copies where required for business or regulatory purposes.
Responsible disclosure
If you believe you have discovered a security issue affecting Varox, please contact: [email protected]
Please provide sufficient detail to help us investigate responsibly.
Security limitations
No online platform can guarantee absolute security.
While we implement reasonable technical and organizational safeguards, customers should evaluate Varox based on their own operational, regulatory, and security requirements.