Last updated: February 19, 2026
At Yander, security is foundational to our platform. We protect your data with enterprise-grade security measures across every layer of our infrastructure, from encryption and authentication to strict tenant isolation and monitoring.
This page provides an overview of how we safeguard your organization's data. If you have specific security questions or need documentation for your procurement process, reach out to our team at jordan@yanderlabs.com.
Yander is hosted on Railway, which runs on top of Amazon Web Services (AWS) infrastructure in the US-East-1 region. Our production environment includes managed PostgreSQL with pgvector for AI workloads and Redis for task queuing and background job management.
All application services run in isolated containers with no shared state between tenants at the infrastructure level. Our deployment pipeline enforces immutable builds, meaning every release is a fresh container image with no carryover from previous deployments.
We apply encryption to your data both at rest and in transit:
Yander uses Clerk for authentication, providing a hardened, purpose-built identity layer with support for Single Sign-On (SSO), multi-factor authentication (MFA), and enterprise identity providers.
Yander operates a multi-tenant architecture with strict logical data isolation. Every database query is filtered by a tenant identifier that is extracted directly from the authenticated JWT — never from client-supplied input. This means there is no code path through which one organization can access another's data.
As an additional safeguard, any attempt to access resources belonging to another tenant returns a 404 (Not Found) response rather than a 403 (Forbidden), preventing any information leakage about the existence of other organizations or their data.
Each organization operates within its own data boundary, with complete separation of entities, scores, integration credentials, and configuration.
When you connect workplace tools, Yander collects and processes communication content to power AI-driven team intelligence. This includes email content, Slack messages, calendar event details, meeting transcripts, and document text from connected tools.
This data is processed by AI models to extract:
Raw communication content is never displayed in the dashboard. Only AI-extracted insights, scores, and summaries are surfaced to users. Yander employees do not review your raw communication content except as necessary for technical support with your explicit consent.
Our logging infrastructure is designed to minimize the presence of personally identifiable information. Application logs primarily contain anonymized identifiers such as tenant IDs and entity IDs rather than customer names or email addresses.
All logs include structured request tracing with request IDs and duration metrics, enabling rapid incident investigation while limiting exposure of personal information.
Error monitoring is handled through Sentry. On the frontend, session replays are masked and only anonymized user identifiers are transmitted. On the backend, error events are filtered to reduce noise and limit the inclusion of sensitive data in error reports.
We maintain a structured incident response process to detect, respond to, and recover from security events:
Yander is built with regulatory compliance as a core requirement, not an afterthought:
We use a limited set of third-party service providers (sub-processors) to deliver our platform. Each sub-processor is vetted for security practices and bound by data processing agreements.
| Sub-Processor | Purpose | Location |
|---|---|---|
| Railway (AWS) | Application hosting, database, and Redis | US |
| Clerk | Authentication and user management | US |
| Nango | OAuth and integration API proxy | US/EU |
| OpenRouter | LLM inference (AI processing) | US |
| Stripe | Payment processing | US |
| Sentry | Error monitoring (no PII) | US |
| PostHog | Product analytics (anonymous events) | US/EU |
A complete and up-to-date list of sub-processors is maintained in our Data Processing Agreement.
We value the work of security researchers who help keep our platform and users safe. If you discover a vulnerability in Yander, we encourage you to report it to us responsibly.
Have questions about our security practices or need documentation for your security review? We are here to help.
Yander Labs, Inc.
2261 Market Street STE 46212
San Francisco, CA 94114
Security inquiries: jordan@yanderlabs.com
Legal and privacy: jordan@yanderlabs.com