At Lumendash, information security is a top priority. Safeguarding your data is one of our core responsibilities. We are committed to transparency in everything we do—including how we approach security—so you can clearly understand the measures we take to protect your information.
Lumendash has established a comprehensive security program designed to protect both our internal operations and customer data. Oversight of this program is led by our Chief Technology Officer (CTO), who ensures appropriate security controls are in place and continuously reviewed and enhanced.
We take a transparent stance when it comes to security compliance. This approach enhances our customers’ trust and simplifies the process of conducting Security Due Diligence on our SaaS platform.
We do not distribute policy documents publicly. If you require specific information, please reach out to your designated sales representative.
Generally, the data we process is related to cost tracking. This includes metrics such as cost, click counts, sign-ups, and similar performance indicators. The data comes from platforms our customers already use—such as Facebook or LinkedIn—and is only imported into Lumendash when the customer actively chooses to do so.
In some rare cases, data fields might include items like customer ID numbers or similar identifiers that could be considered personal data. However, personally identifiable information (PII) is not the primary type of data we manage—our focus is on cost monitoring and performance metrics.
Our security framework is built around preventing unauthorized access to customer data. Information is managed carefully across its full lifecycle, supported by a comprehensive set of security controls.
All information assets are classified using a formal classification matrix. Ownership and responsibility are clearly assigned throughout the organization.
We protect all data transmitted between customer systems and Lumendash using strong encryption via Transport Layer Security (TLS 1.2).
All stored data is automatically encrypted using Microsoft-managed keys, securely held in Azure Key Vault.
Lumendash is hosted on the Azure Cloud platform. Each customer’s data is logically separated from others, ensuring clear boundaries.
Access controls are in place to ensure that only authorized individuals can access specific systems or data. Access is granted based on job function and follows the principles of "Least Privilege" and "Need-to-Know."
We secure administrative access to our services using robust authentication methods, including Single Sign-On (SSO).
Privileged access is limited to authorized personnel. All use of elevated access is closely tracked and audited.
We conduct regular reviews of user access according to a defined process, ensuring that permissions remain appropriate over time.
Customers can use Single Sign-On (SSO) and Multi-Factor Authentication (MFA) through platforms like Google and Azure Active Directory for secure access.
Effective risk management is central to our business. We aim to foster a strong risk-aware culture that supports our long-term stability and security posture.
Risks are continuously identified, assessed, and managed. Each risk is evaluated based on likelihood and potential impact, using a standardized risk model.
Our development lifecycle incorporates security at every stage. Security considerations are embedded in all phases of the software development process.
All updates to production code undergo a peer review that includes checks for security and performance. Before any production deployment, developers confirm that updates function correctly in the staging environment.
We maintain an automated process to monitor and address vulnerabilities in third-party software used during development.
Lumendash maintains a formal incident management process that outlines roles, communication protocols, escalation paths, and response procedures for any service or security-related incidents.
Since Lumendash operates within Azure infrastructure, we rely on Microsoft’s robust physical security measures at their data centers. We regularly review independent audits to ensure compliance and performance.
Our services are deployed across multiple Azure availability zones, providing resilience against disruptions caused by natural disasters, power failures, or connectivity issues. Customer data is retained for the duration of the customer’s engagement with Lumendash, or until the customer requests its deletion.
For major disruptions, Lumendash has a comprehensive Business Continuity Plan to ensure continued operations.