Security at Proxy

Deploy keyless access that’s secure without being burdensome.

Security is in our DNA

Proxy was designed and built with security in its DNA because it is fundamental to what we do. We live in a time that abounds with risks in both the physical and digital world. In the physical world we use things like keys, fobs, cards, badges, and in the digital world we use passwords, pins, and codes to represent our credentials. But all of these are only as good as their fundamentals. Keys, cards, and badges can be cloned, passwords can be shared, guessed, or stolen, pins and verification codes can be phished. We believe this separation is artificial and are dedicated to providing our customers and users comprehensive protection across both realms.

No master keys — every device is unique and can be re-keyed at any time.
Multiple factors for every interaction.
Biometric verification that does not leave your smartphone.

Tokenized Data and Credentials

Proxy’s patent-pending Universal Identity technology removes the need to trust personal devices and wireless communication channels through the combined use of tokenization and encryption.

Tokenization is the process of protecting sensitive data by replacing it with an algorithmically generated number called a token, and it is commonly used to protect sensitive information. 
Your Proxy Signal, emitted via Bluetooth from your smartphone, transmits your identity to other Proxy devices through randomly generated tokens which can be authenticated and verified by the receiver. These tokens can be stored on personal devices or passed through various insecure networks such as Bluetooth, without your personal information ever being exposed.

Proxy tokens can also carry additional payload in a uniquely encrypted, one-time, authenticated vault, enabling offline verification while keeping the payload safe from eavesdroppers.

Compliance certifications and regulations

Proxy complies with enterprise security and privacy requirements, such as SOC-2 and GDPR, and works with external auditors to ensure the highest grade of security is met and adhered to.



Proxy regularly audits and tests its cross-functional security practices.


Proxy believes in the self-sovereignty of personal data.

Privacy and Data Protection

Proxy is committed to helping our users understand their rights and our obligations under the General Data Protection Regulation (GDPR) and other upcoming laws. We have introduced tools and processes, such as collecting explicit consent, to ensure our compliance with the requirements and to help our customers comply with these important regulations as well.


How does Proxy secure your data?

At Proxy, we practice security in depth and apply best practices to keep your data and our systems safe.

Data encryption in transit and at rest
Real-time infrastructure monitoring
Regular security audits

More details

Security assessment

Request a copy of our latest external security assessment.

SOC-2 report

Review our controls for security, availability, and confidentiality.

Responsible disclosure

Report a security vulnerability or breach to our security team.

Security questions or issues?

If you have security questions or think you may have found a security vulnerability, please get in touch with our security team.