Trust Center

Security at Athas

A transparent view of security controls, data practices, and enterprise support for adoption reviews.

Security posture and review support

We keep controls practical and documented so security teams can evaluate Athas quickly. If you need details for internal review, we provide current answers and materials through our security contact channel.

Control areas

Secure Update Workflow

Desktop updates follow signed release channels with rollback support.

Secrets and Identity

Credential handling is scoped, and authentication paths are explicit and auditable.

Data Protection

Encryption in transit and clear boundaries between telemetry and user content.

Operational Response

Documented incident reporting and prioritized vulnerability handling.

Security practices

If your security team needs specific evidence or questionnaire answers, contact us and we will provide the latest documentation package.

  • Security fixes are prioritized and released in regular update windows.
  • Dependency and supply-chain risks are reviewed as part of release checks.
  • Privacy controls are user-visible and consent-aware on web surfaces.
  • Enterprise support channel is available at [email protected].

Talk to us about enterprise rollout

Share your security and deployment requirements and we'll map a rollout plan with your team.