Trust & Security

Trust Center

Security, privacy, and reliability controls built into OXVO covering support, cobrowsing, analytics, session replay, and AIassisted workflows.

Trust controls

Controls library

Controls library

Design

Design

Logging

Logging

Trust FAQs

Need security documentation or a vendor review? Contact Security.

Does OXVO support two‑factor authentication (2FA/MFA)?
icon

Yes. OXVO supports TOTP-based MFA, compatible with authenticator apps such as Google Authenticator, Microsoft Authenticator, and Authy. You can enable it per user and (recommended) enforce it for admins and agents

Does OXVO support SSO?
icon

Yes. OXVO supports SAML 2.0 SSO, allowing you to centralize authentication via your identity provider and manage access consistently across your organization.

Does OXVO support role-based permissions (RBAC)?
icon

Yes. OXVO includes RBAC so you can apply least‑privilege access and restrict sensitive actions (like exports, configuration changes, or access to session data) to trusted roles.

Does OXVO support automated provisioning (SCIM)?
icon

Yes, on Enterprise. SCIM provisioning helps you automate user lifecycle management (create/update/deactivate) to reduce manual admin work and prevent orphaned access.

How long does it take to create a dashboard?
icon

Most users create their first dashboard in under 10 minutes. Complex dashboards with multiple data sources typically take 30-45 minutes.

Is data encrypted in transit?
icon

Yes. OXVO encrypts data in transit using secure HTTPS/TLS connections for the web app and APIs.

Is data encrypted at rest?
icon

Yes. OXVO encrypts stored data at rest, including application records and stored files/objects, to protect confidentiality in storage.

Are backups performed, and are they encrypted?
icon

OXVO supports encrypted backups designed for disaster recovery and continuity. Backup access is restricted and restore workflows can be documented and tested.

How does OXVO protect privacy in session replay?
icon

OXVO Sessions supports masking and redaction to reduce the risk of capturing sensitive information. You can mask inputs, block specific elements, and exclude sensitive pages (e.g., authentication, billing, identity flows).

Can we start recording only after consent?
icon

Yes. OXVO Sessions supports consent-aware recording controls, including starting after consent is granted and pausing/disabling capture for specific routes or flows. This helps align with privacy requirements and user expectations.

How do I report a security vulnerability? Do you run a bug bounty?
icon

You can report vulnerabilities to security@oxvo.ai with steps to reproduce and impact details. OXVO supports a Responsible Disclosure process, and a structured bug bounty program can be operated as an Advanced security practice.

Trust FAQs

Need security documentation or a vendor review? Contact Security.

Does OXVO support two‑factor authentication (2FA/MFA)?
icon

Yes. OXVO supports TOTP-based MFA, compatible with authenticator apps such as Google Authenticator, Microsoft Authenticator, and Authy. You can enable it per user and (recommended) enforce it for admins and agents

Does OXVO support SSO?
icon

Yes. OXVO supports SAML 2.0 SSO, allowing you to centralize authentication via your identity provider and manage access consistently across your organization.

Does OXVO support role-based permissions (RBAC)?
icon

Yes. OXVO includes RBAC so you can apply least‑privilege access and restrict sensitive actions (like exports, configuration changes, or access to session data) to trusted roles.

Does OXVO support automated provisioning (SCIM)?
icon

Yes, on Enterprise. SCIM provisioning helps you automate user lifecycle management (create/update/deactivate) to reduce manual admin work and prevent orphaned access.

How long does it take to create a dashboard?
icon

Most users create their first dashboard in under 10 minutes. Complex dashboards with multiple data sources typically take 30-45 minutes.

Is data encrypted in transit?
icon

Yes. OXVO encrypts data in transit using secure HTTPS/TLS connections for the web app and APIs.

Is data encrypted at rest?
icon

Yes. OXVO encrypts stored data at rest, including application records and stored files/objects, to protect confidentiality in storage.

Are backups performed, and are they encrypted?
icon

OXVO supports encrypted backups designed for disaster recovery and continuity. Backup access is restricted and restore workflows can be documented and tested.

How does OXVO protect privacy in session replay?
icon

OXVO Sessions supports masking and redaction to reduce the risk of capturing sensitive information. You can mask inputs, block specific elements, and exclude sensitive pages (e.g., authentication, billing, identity flows).

Can we start recording only after consent?
icon

Yes. OXVO Sessions supports consent-aware recording controls, including starting after consent is granted and pausing/disabling capture for specific routes or flows. This helps align with privacy requirements and user expectations.

How do I report a security vulnerability? Do you run a bug bounty?
icon

You can report vulnerabilities to security@oxvo.ai with steps to reproduce and impact details. OXVO supports a Responsible Disclosure process, and a structured bug bounty program can be operated as an Advanced security practice.

Trust FAQs

Need security documentation or a vendor review? Contact Security.

Does OXVO support two‑factor authentication (2FA/MFA)?
icon

Yes. OXVO supports TOTP-based MFA, compatible with authenticator apps such as Google Authenticator, Microsoft Authenticator, and Authy. You can enable it per user and (recommended) enforce it for admins and agents

Does OXVO support SSO?
icon

Yes. OXVO supports SAML 2.0 SSO, allowing you to centralize authentication via your identity provider and manage access consistently across your organization.

Does OXVO support role-based permissions (RBAC)?
icon

Yes. OXVO includes RBAC so you can apply least‑privilege access and restrict sensitive actions (like exports, configuration changes, or access to session data) to trusted roles.

Does OXVO support automated provisioning (SCIM)?
icon

Yes, on Enterprise. SCIM provisioning helps you automate user lifecycle management (create/update/deactivate) to reduce manual admin work and prevent orphaned access.

How long does it take to create a dashboard?
icon

Most users create their first dashboard in under 10 minutes. Complex dashboards with multiple data sources typically take 30-45 minutes.

Is data encrypted in transit?
icon

Yes. OXVO encrypts data in transit using secure HTTPS/TLS connections for the web app and APIs.

Is data encrypted at rest?
icon

Yes. OXVO encrypts stored data at rest, including application records and stored files/objects, to protect confidentiality in storage.

Are backups performed, and are they encrypted?
icon

OXVO supports encrypted backups designed for disaster recovery and continuity. Backup access is restricted and restore workflows can be documented and tested.

How does OXVO protect privacy in session replay?
icon

OXVO Sessions supports masking and redaction to reduce the risk of capturing sensitive information. You can mask inputs, block specific elements, and exclude sensitive pages (e.g., authentication, billing, identity flows).

Can we start recording only after consent?
icon

Yes. OXVO Sessions supports consent-aware recording controls, including starting after consent is granted and pausing/disabling capture for specific routes or flows. This helps align with privacy requirements and user expectations.

How do I report a security vulnerability? Do you run a bug bounty?
icon

You can report vulnerabilities to security@oxvo.ai with steps to reproduce and impact details. OXVO supports a Responsible Disclosure process, and a structured bug bounty program can be operated as an Advanced security practice.