PLATFORM

Enterprise Security

Your business handles sensitive customer data — addresses, payment information, call recordings, and financial records. We treat that data with the same level of care a bank treats deposits. SOC 2 Type II, AES-256 encryption, full audit logging, and zero tolerance for shortcuts.

homepro.ai / security / status / compliance
Incidents
0
Last 90 days
Compliance
SOC 2
Type II active
Encryption
AES-256
At rest + transit
SCANDaily vulnerability scan: all endpoints clear
AUDITAccess log review complete — no anomalies detected
CERTSOC 2 Type II — next audit: Q3 2026 ✓
SOC 2
Type II certified
AES-256
Encryption at rest
TLS 1.3
Encryption in transit
99.9%
Uptime SLA
Operational Blueprint

Infrastructure Governance.

We treat your data with the same level of care a bank treats deposits. Full audit logging, zero-trust architecture, and autonomous threat mitigation.

Authentication
Multi-Factor Identity Verification
The system enforces hardware-level MFA for all administrative access. Identity signals are autonomously verified against known behavioral patterns to prevent session hijacking.
Privilege
Just-In-Time Privilege Escalation
Access isn't persistent; it's granted. The system autonomously manages JIT (Just-In-Time) access for sensitive operations, ensuring that high-level permissions expire the moment a task is complete.
Monitoring
Autonomous Anomaly Detection
The security engine monitors every API call and data export. It autonomously flags unusual patterns—like a tech exporting 500 contacts at 2 AM—and triggers an instant lockdown sequence.
Containment
Automated Threat Containment
Upon detection of a breach signal, the system autonomously rotates encryption keys, invalidates all active sessions, and isolates the affected environment in < 50ms.
Security Intelligence Log
AUTH Admin login: J. Smith. [MFA] Verified via WebAuthn.
PRIV JIT Escalation: [DB_READ] granted for 15m.
SCAN Monitoring egress traffic... Anomalies: 0.
ALRT [ANOMALY] Tech #04 login from unexpected IP (Latvia).
ACT ACTION: Session terminated. MFA re-challenge issued.
DONE Environment secure. Compliance integrity: 100%.
Security Latency: 12ms / Threat Response: Autonomous
Security Maturity

Password Sharing vs. Autonomous Enterprise Governance.

Traditional Risk
  • Sharing ServiceTitan logins across the whole team.
  • No audit trail of who modified customer data.
  • Passwords stored in Excel or post-it notes.
  • Ex-employees retaining access to sensitive files.
The HomePro Vault
  • Zero-trust architecture with JIT access controls.
  • Full high-fidelity audit logging for every action.
  • Hardware-backed MFA for all critical entry points.
  • Instant, platform-wide kill switch for any user.

SOC 2 Type II Compliance

Independently audited annually by a Big 4 firm. Our controls for security, availability, and confidentiality meet the same standards required by enterprise financial institutions.

Role-Based Access Control

Define exactly who can see what. Your techs see their schedule. Your dispatcher sees the board. Your accountant sees the books. Your PE firm sees the portfolio dashboard. Everyone sees only what they need.

Full Audit Logging

Every data access, every modification, every export is logged with timestamp, user ID, and IP address. Complete audit trail for compliance and accountability.

Credential Vault

For the Browser Agent — your third-party login credentials are stored in an isolated vault with AES-256 encryption. Accessed only during active sessions. Revocable instantly.

AI Data Privacy

Your data is NEVER used to train public AI models. Call transcripts, customer records, and business data remain isolated to your account. Period.

Data Residency

Your data is stored in US-based data centers. We do not process or store data outside the United States unless explicitly requested for international operations.

How It Works

How HomePro security works.

01
Access
Provision

New users provisioned with role-based access—techs see their jobs, managers see their teams, admins see everything.

02
Log
Audit

Every record view, edit, and export logged with timestamp and user ID—full audit trail for compliance.

03
Alert
Monitor

Real-time alerts for unusual access patterns, bulk exports, or permission escalation attempts.

04
Certify
Comply

Built-in data handling for SOC 2, state-level privacy regs, and insurance-grade record retention policies.

Access Control
Role-Based
5-tier permission model with field-level data visibility controls
Audit Completeness
100%
of user actions logged with full attribution and timestamp
Breach Detection
< 5 min
average time from anomalous access to security alert delivered to admin
Compliance
SOC 2 Ready
audit log structure and data handling aligned with SOC 2 Type II requirements
Owner Voices

What trades owners actually say.

"We passed our insurance audit because of HomePro's access logs. Every action was documented perfectly."
P
Paul T.
Multi-Location HVAC CTO · Chicago, IL
"Role-based access means my office staff only sees what they need to. No more accidental data exposure."
C
Crystal M.
Plumbing Owner · Houston, TX

Your customers trust you with their home. You should trust your software with their data.

HomePro meets enterprise-grade security standards so your data — and your customers' data — is always protected.

Learn more