Security & Trust
Your security, safety, and privacy is our top priority — and we build Lantern accordingly.
Security
Lantern is built for enterprises that need strong security, privacy, and operational controls. We continuously invest in people, processes, and technology to protect customer data.
Last updated: September 25, 2025
Compliance & Certifications
We follow SOC 2/ISO 27001 aligned practices. We are in the process of preparing for SOC 2 Type I certification.
Key Security Controls
Data Security & Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption. We implement zero-trust principles and regularly audit our encryption implementations.
Access Control
Role-based access control (RBAC) ensures users only access data necessary for their roles. Multi-factor authentication (MFA) is required for all administrative access.
Incident Response
We maintain a comprehensive incident response plan with 24/7 monitoring, automated alerting, and clear escalation procedures to minimize impact and ensure rapid recovery.
Vendor Management
All third-party vendors undergo rigorous security assessments before onboarding. We maintain detailed subcontractor agreements and regular security reviews.
Enterprise Security
Enterprise customers can request our security questionnaire, SOC 2 attestation (when available), and detailed documentation. Contact our sales team for enterprise security reviews and compliance documentation.
Privacy
We minimize data collection, process data only for described purposes, and provide mechanisms to support data deletion and retention requirements.
Data Handling
We believe in transparency about how we collect, use, and share information. Data transfers to subprocessors are governed by contractual safeguards.
Legal Compliance
Our terms are continually assessed by privacy experts to ensure compliance with GDPR, CCPA, and other global privacy standards.
Data Governance
Data governance ensures our users' data remains secure, private, accurate, and accessible throughout its lifecycle.
Contact
For security inquiries or responsible disclosure, contact our security team or request a demo to discuss enterprise requirements.