Migrating from Rockset? Find out if Hydrolix is right for you >>


Keeping our customer data safe and secure is our highest priority. We take threats very seriously and work hard to protect our customers and their data.

Comments and Requests

To make a request or report an issue with Hydrolix, please contact us using our security issue report form.

Vulnerability Disclosure

If you would like to report a vulnerability or have a security concern, please contact us using our security issue report form.

Include a proof of concept, a list of tools used, and the output of your process. Once received, we verify each vulnerability and take necessary steps to fix it. Once verified, we periodically send status updates as problems are fixed.

Security Techniques

Hydrolix uses industry standard techniques to secure your data from unauthorized access.

Infrastructure and Network Security

Hydrolix runs on cloud infrastructure including Amazon Web Services (AWS), Google Cloud Platform (GCP), and Linode. These platforms follow industry standard security techniques, including:
• access control
• network monitoring and protection
• physical access control

Penetration Testing

Hydrolix performs penetration testing via a third party on a regular basis.

Data Segregation

Customer data is deployed exclusively on customer cloud resources. This means that customer data never mixes.