Data Security
Last Updated: March 2026
STRATUM is built to handle sensitive exploration intelligence. We treat your data security with the seriousness it requires, employing industry-standard infrastructure and practices to ensure your information remains confidential and protected.
Infrastructure
STRATUM is hosted on reputable, top-tier cloud infrastructure providers. Our hosting environments comply with stringent, industry-standard physical and network security controls, ensuring that the foundational layers of our platform are resilient against unauthorized access.
Data in Transit
Every piece of data transmitted between your browser and STRATUM servers is encrypted using modern HTTPS/TLS protocols. This ensures that your queries, shapefiles, and account details cannot be intercepted or read while traveling across the internet.
Data at Rest
User data, account credentials, and saved project states are stored in encrypted databases. We utilize robust encryption standards for all persistent storage volumes to ensure data remains secure even in the event of unauthorized access to the underlying storage media.
Access Controls & Isolation
Access to our production systems is heavily restricted, logged, and limited to essential engineering personnel only. Within the STRATUM application itself, strict tenant isolation ensures that your project data, saved views, and usage history are completely inaccessible to other users.
Responsible Disclosure
We believe keeping data secure is a collaborative effort. If you are a security researcher or user and believe you have discovered a security vulnerability within the STRATUM platform, we ask that you report it to us at security@stratum.com before disclosing it publicly. We are committed to responding promptly and addressing validated issues.
Questions
If you have any specific questions about our security practices, compliance, or how we handle your company data, please reach out to us at hello@stratumexplore.com.