Certified ISO 27001:2022

Ensure the security of your customer data

Customer data is a strategic asset. Feedier ensures its confidentiality, integrity, and availability through ISO 27001 certified security and high compliance standards.

Certification

Feedier is ISO 27001:2022 certified and compliant with SOC2 standards. Our certificates can be requested by contacting our team.

Governance layer

Feedier offers a set of features to ensure the security of your data in the dashboard: roles, dashboard views, teams.

Third-party contractors

Feedier relies on a limited set of subcontractors, selected after undergoing a prior verification to assess their maturity.

Data Security and Enhanced Governance

Feedier's AI Agents are designed to accelerate and enhance your CX missions, from analyzing feedback to implementing concrete actions.

Transparency

Transparency is fundamental to building stronger relationships. At Feedier, we are committed to providing a comprehensive security package that includes the latest ISO 27001 certification, OWASP test results, internal security management policies, and detailed documentation of the architecture.

Integrated SSO Support

Feedier offers integrated support for Single Sign-On (SSO) with OIDC 2.0, streamlining the authentication process and enhancing security. With SSO, users can access Feedier using their existing credentials from your organization's identity provider.

System Monitoring and Alerts

At Feedier, production applications and underlying components are monitored 24/7/365 by dedicated monitoring systems. Critical alerts generated by these systems are sent to the 24/7/365 DevOps team members and appropriately escalated to operations management.

Our security approach,
reliable at all levels

From development to employee access, every step is designed to ensure the confidentiality, integrity, and availability of your data.

Employee access

Access to software and tools is strictly limited, following the principle of least privilege, to enhance the security of interventions.

Servers and networks

Recent Linux servers are hosted off-site, continuously updated, and hosted via AWS or OVH with a reliable IaaS architecture.

Isolated environments

Production environments are physically separated from testing and development environments to ensure quality and security.

Coding practices and
testing phase

Development follows strict standards and documented quality controls, incorporating OWASP recommendations.

Service levels
and backups

A scalable infrastructure with daily encrypted backups, continuous deployments, and load balancing ensures reliability.

Anonymization and encryption features

Sensitive data can be automatically anonymized or encrypted to enhance privacy on the platform.

FAQ

Frequently Asked Questions

Features, security, integration, support... Find here the answers to the most frequently asked questions about Feedier.

For any specific request, our team is here to listen.

Is Feedier ISO 27001 certified and compliant with international standards?

Yes, Feedier is ISO 27001:2022 certified. Our security policy also aligns with GDPR, CCPA, NIST guidelines, and OWASP best practices.

How is data access controlled within the platform?

Access is governed by the principle of least privilege, enforced through role-based access control (RBAC), strict separation of environments (production, test, development), logging of sensitive actions, and data classification by sensitivity level. Access to confidential data requires formal validation.

Do you use subcontractors to host or process data?

Only carefully selected strategic providers, such as AWS or OVH for hosting, SendGrid/Brevo for email, and Datadog for monitoring. All critical data processing is carried out within the European Union, under strict security agreements.

What monitoring and alerting systems are in place?

Feedier uses Datadog (SIEM) and Sentry to monitor platform activity 24/7. Alerts are triggered automatically in case of anomalies or critical threats. Vulnerabilities are regularly assessed through scans and penetration tests.

Do you support native Single Sign-On (SSO)?

Yes. Feedier supports Single Sign-On using the OIDC 2.0 protocol. Access is controlled based on your organization’s identity provider policies.

How does data anonymization and encryption work?

Data is encrypted at rest (GPG) and in transit (TLS 1.3). Passwords are never stored—only hashed (bcrypt). Anonymization is powered by our NLP engine and can be automated at set intervals. Masking, pseudonymization, and deletion of sensitive attributes are fully customizable.

Are production environments properly isolated?

Yes. Production, testing, and development environments are entirely separated—both physically and logically—to prevent unauthorized access to operational data.

What development practices do you follow?

Our teams follow ANSSI and OWASP guidelines. Code is systematically reviewed (peer-review), scanned for vulnerabilities, and validated through a secure CI pipeline. Every release follows documented and traceable testing procedures.

Where is the data hosted, and by whom?

All data is hosted in Europe, primarily in AWS data centers (Dublin) and OVH (Paris for dedicated instances). No processing is outsourced outside the EU.

Do you offer a security package for internal audits?

Yes. Upon request, we provide a complete package including our ISO certification, OWASP test results, security policy, and detailed technical documentation of our architecture.