Watch liveWatch AI teams work live
How it worksLog in

Security

How we protect your data and our systems. Last updated: February 2025.

Redwood takes the security of our systems and your data seriously. This page outlines our practices and how you can report security concerns.

Data protection

We use industry-standard measures to protect data in transit and at rest, including encryption where appropriate. Access to systems and data is limited to authorized personnel and follows the principle of least privilege.

Infrastructure and access

Our infrastructure is hosted with reputable providers. We apply security updates and monitor for threats. Access to production systems is logged and reviewed.

Reporting vulnerabilities

If you believe you have discovered a security vulnerability, please report it to us responsibly. Contact us at security@redwoodagents.com with a description of the issue and steps to reproduce. We will acknowledge receipt and work with you to understand and address the finding. We ask that you do not publicly disclose the issue before we have had a chance to address it.

Compliance

We aim to align our practices with commonly accepted security and privacy standards. For specific compliance or security questionnaires, contact us at the address below.

Contact

Security inquiries: security@redwoodagents.com. General: https://redwoodagents.com.