Trust & Security
Trust Center
Security, privacy, and reliability controls built into OXVO covering support, co‑browsing, analytics, session replay, and AI‑assisted workflows.
Trust controls
Controls library
Controls library
Core protections
Core protections
Identity & Access
Identity & Access
Data Security
Data Security
Privacy & Compliance
Product Security
Product Security
Reliability & Operations
Reliability & Operations
DevTools
DevTools
Design
Design
Logging
Logging
Trust FAQs
Need security documentation or a vendor review? Contact Security.
Yes. OXVO supports TOTP-based MFA, compatible with authenticator apps such as Google Authenticator, Microsoft Authenticator, and Authy. You can enable it per user and (recommended) enforce it for admins and agents
Yes. OXVO supports SAML 2.0 SSO, allowing you to centralize authentication via your identity provider and manage access consistently across your organization.
Yes. OXVO includes RBAC so you can apply least‑privilege access and restrict sensitive actions (like exports, configuration changes, or access to session data) to trusted roles.
Yes, on Enterprise. SCIM provisioning helps you automate user lifecycle management (create/update/deactivate) to reduce manual admin work and prevent orphaned access.
Most users create their first dashboard in under 10 minutes. Complex dashboards with multiple data sources typically take 30-45 minutes.
Yes. OXVO encrypts data in transit using secure HTTPS/TLS connections for the web app and APIs.
Yes. OXVO encrypts stored data at rest, including application records and stored files/objects, to protect confidentiality in storage.
OXVO supports encrypted backups designed for disaster recovery and continuity. Backup access is restricted and restore workflows can be documented and tested.
OXVO Sessions supports masking and redaction to reduce the risk of capturing sensitive information. You can mask inputs, block specific elements, and exclude sensitive pages (e.g., authentication, billing, identity flows).
Yes. OXVO Sessions supports consent-aware recording controls, including starting after consent is granted and pausing/disabling capture for specific routes or flows. This helps align with privacy requirements and user expectations.
You can report vulnerabilities to security@oxvo.ai with steps to reproduce and impact details. OXVO supports a Responsible Disclosure process, and a structured bug bounty program can be operated as an Advanced security practice.
Trust FAQs
Need security documentation or a vendor review? Contact Security.
Yes. OXVO supports TOTP-based MFA, compatible with authenticator apps such as Google Authenticator, Microsoft Authenticator, and Authy. You can enable it per user and (recommended) enforce it for admins and agents
Yes. OXVO supports SAML 2.0 SSO, allowing you to centralize authentication via your identity provider and manage access consistently across your organization.
Yes. OXVO includes RBAC so you can apply least‑privilege access and restrict sensitive actions (like exports, configuration changes, or access to session data) to trusted roles.
Yes, on Enterprise. SCIM provisioning helps you automate user lifecycle management (create/update/deactivate) to reduce manual admin work and prevent orphaned access.
Most users create their first dashboard in under 10 minutes. Complex dashboards with multiple data sources typically take 30-45 minutes.
Yes. OXVO encrypts data in transit using secure HTTPS/TLS connections for the web app and APIs.
Yes. OXVO encrypts stored data at rest, including application records and stored files/objects, to protect confidentiality in storage.
OXVO supports encrypted backups designed for disaster recovery and continuity. Backup access is restricted and restore workflows can be documented and tested.
OXVO Sessions supports masking and redaction to reduce the risk of capturing sensitive information. You can mask inputs, block specific elements, and exclude sensitive pages (e.g., authentication, billing, identity flows).
Yes. OXVO Sessions supports consent-aware recording controls, including starting after consent is granted and pausing/disabling capture for specific routes or flows. This helps align with privacy requirements and user expectations.
You can report vulnerabilities to security@oxvo.ai with steps to reproduce and impact details. OXVO supports a Responsible Disclosure process, and a structured bug bounty program can be operated as an Advanced security practice.
Trust FAQs
Need security documentation or a vendor review? Contact Security.
Yes. OXVO supports TOTP-based MFA, compatible with authenticator apps such as Google Authenticator, Microsoft Authenticator, and Authy. You can enable it per user and (recommended) enforce it for admins and agents
Yes. OXVO supports SAML 2.0 SSO, allowing you to centralize authentication via your identity provider and manage access consistently across your organization.
Yes. OXVO includes RBAC so you can apply least‑privilege access and restrict sensitive actions (like exports, configuration changes, or access to session data) to trusted roles.
Yes, on Enterprise. SCIM provisioning helps you automate user lifecycle management (create/update/deactivate) to reduce manual admin work and prevent orphaned access.
Most users create their first dashboard in under 10 minutes. Complex dashboards with multiple data sources typically take 30-45 minutes.
Yes. OXVO encrypts data in transit using secure HTTPS/TLS connections for the web app and APIs.
Yes. OXVO encrypts stored data at rest, including application records and stored files/objects, to protect confidentiality in storage.
OXVO supports encrypted backups designed for disaster recovery and continuity. Backup access is restricted and restore workflows can be documented and tested.
OXVO Sessions supports masking and redaction to reduce the risk of capturing sensitive information. You can mask inputs, block specific elements, and exclude sensitive pages (e.g., authentication, billing, identity flows).
Yes. OXVO Sessions supports consent-aware recording controls, including starting after consent is granted and pausing/disabling capture for specific routes or flows. This helps align with privacy requirements and user expectations.
You can report vulnerabilities to security@oxvo.ai with steps to reproduce and impact details. OXVO supports a Responsible Disclosure process, and a structured bug bounty program can be operated as an Advanced security practice.
