Ensure the security of your customer data
Customer data is a strategic asset. Feedier ensures its confidentiality, integrity, and availability through ISO 27001 certified security and high compliance standards.
Feedier is ISO 27001:2022 certified and compliant with SOC2 standards. Our certificates can be requested by contacting our team.

Feedier offers a set of features to ensure the security of your data in the dashboard: roles, dashboard views, teams.
Feedier relies on a limited set of subcontractors, selected after undergoing a prior verification to assess their maturity.
Data Security and Enhanced Governance
Feedier's AI Agents are designed to accelerate and enhance your CX missions, from analyzing feedback to implementing concrete actions.
Transparency
Transparency is fundamental to building stronger relationships. At Feedier, we are committed to providing a comprehensive security package that includes the latest ISO 27001 certification, OWASP test results, internal security management policies, and detailed documentation of the architecture.
Integrated SSO Support
Feedier offers integrated support for Single Sign-On (SSO) with OIDC 2.0, streamlining the authentication process and enhancing security. With SSO, users can access Feedier using their existing credentials from your organization's identity provider.
System Monitoring and Alerts
At Feedier, production applications and underlying components are monitored 24/7/365 by dedicated monitoring systems. Critical alerts generated by these systems are sent to the 24/7/365 DevOps team members and appropriately escalated to operations management.
Our security approach,
reliable at all levels
From development to employee access, every step is designed to ensure the confidentiality, integrity, and availability of your data.
Employee access
Access to software and tools is strictly limited, following the principle of least privilege, to enhance the security of interventions.
Servers and networks
Recent Linux servers are hosted off-site, continuously updated, and hosted via AWS or OVH with a reliable IaaS architecture.
Isolated environments
Production environments are physically separated from testing and development environments to ensure quality and security.
Coding practices and
testing phase
Development follows strict standards and documented quality controls, incorporating OWASP recommendations.
Service levels
and backups
A scalable infrastructure with daily encrypted backups, continuous deployments, and load balancing ensures reliability.
Anonymization and encryption features
Sensitive data can be automatically anonymized or encrypted to enhance privacy on the platform.
Frequently Asked Questions
Features, security, integration, support... Find here the answers to the most frequently asked questions about Feedier.
For any specific request, our team is here to listen.
Yes, Feedier is ISO 27001:2022 certified. Our security policy also aligns with GDPR, CCPA, NIST guidelines, and OWASP best practices.
Access is governed by the principle of least privilege, enforced through role-based access control (RBAC), strict separation of environments (production, test, development), logging of sensitive actions, and data classification by sensitivity level. Access to confidential data requires formal validation.
Only carefully selected strategic providers, such as AWS or OVH for hosting, SendGrid/Brevo for email, and Datadog for monitoring. All critical data processing is carried out within the European Union, under strict security agreements.
Feedier uses Datadog (SIEM) and Sentry to monitor platform activity 24/7. Alerts are triggered automatically in case of anomalies or critical threats. Vulnerabilities are regularly assessed through scans and penetration tests.
Yes. Feedier supports Single Sign-On using the OIDC 2.0 protocol. Access is controlled based on your organization’s identity provider policies.
Data is encrypted at rest (GPG) and in transit (TLS 1.3). Passwords are never stored—only hashed (bcrypt). Anonymization is powered by our NLP engine and can be automated at set intervals. Masking, pseudonymization, and deletion of sensitive attributes are fully customizable.
Yes. Production, testing, and development environments are entirely separated—both physically and logically—to prevent unauthorized access to operational data.
Our teams follow ANSSI and OWASP guidelines. Code is systematically reviewed (peer-review), scanned for vulnerabilities, and validated through a secure CI pipeline. Every release follows documented and traceable testing procedures.
All data is hosted in Europe, primarily in AWS data centers (Dublin) and OVH (Paris for dedicated instances). No processing is outsourced outside the EU.
Yes. Upon request, we provide a complete package including our ISO certification, OWASP test results, security policy, and detailed technical documentation of our architecture.