DATA

Data Security at Panalyt

At Panalyt, data security is a fundamental priority. Our security framework is built upon internationally recognized standards, modern cloud infrastructure, and strict internal governance, ensuring the highest levels of data protection and operational integrity.

Infrastructure and Compliance

Panalyt’s infrastructure operates exclusively on enterprise-grade managed cloud platforms, including Google Cloud Platform (GCP), Microsoft Azure, and Amazon Web Services (AWS). All customer data is securely hosted in Japanese data centers, with encryption applied both in transit and at rest.

Our infrastructure is fully compliant with key international standards, including:

ISO 27001
SOC 1 and SOC 2 / SSAE 16 / ISAE 3402
PCI DSS Level 1
FISMA Moderate
・Sarbanes-Oxley (SOX)

Click here for FAQ on system security English

Internal Data Access Controls

Access to Panalyt’s back-end systems is strictly limited to authorized personnel. Where operational troubleshooting or customer support requires access to client data, such access is granted only under strictly controlled conditions and is fully auditable. All data access activities are comprehensively logged.

Click here for detailed data security policy English Click here for detailed cyber security policy English

Advanced Access Control

Panalyt provides a comprehensive role- and permission-based access control framework, enabling precise management of user access levels.

Panalyt’s access policies include for example:

・High-level access controls, such as restricting access by department, region, data category, or managerial reporting line
・Granular row-level controls, including restrictions on individual data fields or specific employee attributes

These access policies ensure users are granted access strictly on a need-to-know basis.

Authentication and Authorization

Panalyt integrates with enterprise identity providers to support secure authentication and authorization mechanisms, including:

・Single Sign-On (SSO) through OneLogin, Google Workspace, and SAML-compliant identity platforms
・Two-Factor Authentication (2FA) via corporate email accounts, with enforcement options configurable by client administrators

Further details on supported authentication methods are available upon request.

Independent Security Audits

Panalyt undergoes regular independent security audits and penetration testing conducted by external cybersecurity specialists, ensuring our security posture remains robust and aligned with evolving threat landscapes.