Our response to COVID-19:
To know how we're helping our customers, prospects and employees, read this note from our CEO, Yash. If you're a small business, do check out our special pricing on our Standard plan.
close

Fyle is an enterprise grade, secure, expense management system

Read on to learn about how your data stays secure and private, always

Get a demo
/assets/images/alternative-pages/idc-hero.png

Loved by companies that take data security seriously

/assets/images/customer-logos-v2-non-india-lg.png /assets/images/customer-logos-v2-non-india-sm.png
/assets/images/customer-logos-v2-india-lg.png /assets/images/customer-logos-v2-india-sm.png

Fyle Platform Data and Security

Some key features of the Fyle platform to keep your data safe

All Communication Is Encrypted

All clients communicate with Fyle’s servers using industry-best practice HTTPS / TLS only.

Passwords Are Protected

We “salt” and hash the password using SHA-256. This is a one-way transformation and the original password is never stored on our servers.

3rd-party Testing

We routinely get our services assessed by third-parties that check for vulnerabilities and are happy to provide the latest reports upon request.

GDPR-compliant

Many countries (and states) are rightly adopting high-standards for securing user data. We are GDPR-compliant and ensure you own your own data.

Data Retention

We delete all customer data within 30 days of termination of contract. You can back up your data securely using our REST APIs and open-source tools.

Highly Available Infrastructure

We have multiple data centers and maintain an RPO of 24 hours and RTO of 4 hours.

How you can secure your data in Fyle

Critical security features you can configure in your account

/assets/images/security/rbac-icon.svg

Role-based Access Control (RBAC)

Users will have access to only data they need to using RBAC including an auditor role.

/assets/images/security/ip-icon.svg

Single Sign-On (SSO)

Users can authenticate with Fyle using your enterprise’s auth system such as Active Directory (AD) via SAML 2.0.

/assets/images/security/sso-icon.svg

Trusted IP Restrictions

With these restrictions in place, your account admins will only be able to perform critical actions from within your office network.

Know more about how we take data security and privacy seriously at Fyle

Get a demo