Incenta

Security

Security Architecture

Enterprise-grade controls for high-volume referral traffic, event integrity, and reward safety.

1Data Encryption

All data transmitted to and from Incenta is encrypted using industry-standard TLS 1.3 encryption. At rest, sensitive identities and payout data are protected using AES-256 encryption.

2Fraud Protection Engine

Our security fabric uses real-time heuristics to block suspicious activity:

  • Sybil Defense: Multi-layered device fingerprinting to prevent duplicate identities.
  • Velocity Tracking: Automated blocking of anomalous referral surges.
  • Bot Detection: Hardware-level metadata analysis to filter automated traffic.

3Compliance

We follow SOC2 Type II guidelines and maintain strict internal access controls. No PII is exposed to third-party analytics without explicit environment consent.

Security Disclosure

Report vulnerabilities to our security operations center.

security@incenta.dev

Escalation PGP: 0x8A2C...

Read compliance details