Security Program
We maintain a high bar for privacy and security. Your game's IP represents your creativity and craft, and we take our responsibility to keep it safe very seriously. We have integrated best-in-class security practices, use the best tools to track and enforce compliance, and are independently verified.
01
Information Security Program
Compliance
Bezi is SOC 2 Type 2 certified. All customers have access to our certification. To receive a copy of the report, please email security@bezi.com.
Our payment processor, Stripe is a certified Level 1 Service Provider. Bezi never has access to sensitive payment details.

SOC 2 Type 2
02
Internal Security Measures
Personnel security
Bezi completes background checks on all employees.
Identity and access management
Employees have unique logins and passwords for all business-related systems, which live in top-tier password vaults (i.e. 1password). We enforce two-factor authentication wherever possible.
Hardware security
All employee laptops are managed, have encrypted hard drives and are monitored with antivirus software.
Security education
As part of our security commitment, we require every employee to participate in ongoing security training throughout the year. Every new employee has Security training as a part of their onboarding to ensure Bezi remains closed to potential threats.
03
Bezi Application Security
Security features
By hosting Bezi platforms on AWS, we have access to the benefits provided to their customers such as physical security, redundancy, scalability and key management.
In addition to the benefits provided by AWS, we've invested in building additional security features. Capabilities vary based on subscription tier.
Single Sign-On
Role based permissions
Two-factor authentication
IP security
We prioritize security of game IP in Bezi. For more information on how IP is handled, see Security product documentation.
Customer data and privacy
Bezi stores the following customer identifiable data in our cloud:
Customer data
Names (as provided by the user)
Usernames
Email addresses
Company (for Enterprise customers only)
Payments data (stored and processed by Stripe)
Billing email addresses
Payment history and invoices
Billing addresses
Aggregated non-identifiable analytics data
Location (city, country, pulled from IP addresses when using Bezi)
Encryption
All application and customer data is encrypted in flight and at rest.
Third-party subprocessors
Bezi uses third-party service providers to assist with data processing, analytics, and customer engagement activities.
We conduct intense due diligence reviews as part of our service provider evaluation to ensure your data stays secure. The data each Subprocessor has access to is restricted to only what is necessary to perform their service.
Infrastructure availability
Our backend infrastructure is hosted in AWS and is fully monitored to detect any downtime.
SLAs are available through a Master Service Agreement.
Status Page and Incidents
Bezi's Status Page shows real-time incident reporting and historical uptime records from the past 90 days.
Responsible disclosure
If you believe you have discovered a vulnerability within Bezi’s application, please submit a report to security@bezi.com.
If you believe your account has been compromised or you are seeing suspicious activity on your account please report it to security@bezi.com.
If you are Enterprise customer, please reach out to your dedicated Bezi contact as soon as possible.
04
Best Practices
Best practices
Never share credentials for your account.
Use Multi-Factor Authentication or Single Sign-On to access your Bezi account
05
Contact
Contact us
Feel free to email us with any questions regarding our security program at security@bezi.com.
For Enterprise customers, please reach out to your dedicated Bezi contact to get more information.