pending-logo-color

Security

Security Overview

Last Updated: January 29, 2026

At Pending, security is foundational to our platform. We employ a defense-in-depth approach designed to support the integrity, confidentiality, and availability of your real estate transaction data.

1. Infrastructure Security

  • Cloud Security: Our Services are hosted on secure, industry-leading cloud infrastructure providers.
  • Encryption: Data is encrypted in transit using TLS 1.2+ and at rest using AES-256 encryption standards.
  • Network Protection: We utilize firewalls, intrusion detection systems, and network segregation to protect our environment from unauthorized access.

2. Application Security

  • Role-Based Access Control (RBAC): Access to data is strictly enforced based on user roles and specific Deal Room membership. Users only see the data they are explicitly authorized to access.
  • Authentication: We support secure authentication mechanisms to verify user identity.
  • Audit Logging: Critical actions within the platform, such as document uploads, views, and deletions, are logged to create a verifiable audit trail.

3. Operational Security

  • Personnel: Access to production systems by Pending personnel is restricted to authorized staff on a least-privilege basis.
  • Incident Response: We maintain an incident response plan to verify, contain, and recover from potential security incidents.

4. AI Security

  • Data Isolation: AI processing is performed on isolated instances. User data processed by AI models is used strictly for the purpose of providing the requested service and is not used to train public models.

5. Compliance

Our security program is designed to align with industry best practices and support our customers' compliance with real estate regulations.

For reported security issues or concerns, please contact our security team at support@pending.com.