Mercando

Built by Security Engineers,
Not Retrofitted

Mercando was designed from the ground up with enterprise-grade security at every layer. Every document, every action, every access is protected by a comprehensive security architecture that meets the strictest compliance requirements.

SOC 2 Ready
GDPR Ready
AES-256 Encryption

Defense-in-Depth Security Architecture

Layered protection for company data. Every document passes through five independent security layers, ensuring protection at rest, in transit, and during every interaction.

Defense-in-depth application security architecture diagram showing 5 layered protection levels
1

Edge & User Controls

Auto-enforced expiration revokes access when time is up. Zero-knowledge encryption ensures documents are encrypted in your browser before upload -- not even Mercando can read your files.

2

Access & Permission Controls

Fine-grained, role-based access control with 24 distinct permissions per user action. Define exactly who can upload, view, share, or manage documents.

3

Data Management & Integrity

Immutable audit trail with automatically logged, tamper-proof records of all actions -- who, what, when, and where. Audit logs cannot be modified or deleted, even by administrators.

4

Tenant & Infrastructure Isolation

Every company's data is strictly isolated at the database level. Cross-tenant access is architecturally impossible. Each query is scoped to the authenticated company.

5

Core — AES-256 Encryption

The last line of defense. Every document is encrypted at rest using AES-256, the same standard used by governments and financial institutions. Encryption keys are managed per-version.

Authentication & Access Control

Multiple authentication methods and strict access controls ensure only authorized users reach your documents.

Authentication and access control security diagram

Strong Password Policy

Passwords require a minimum of 12 characters with uppercase, lowercase, and digit or special character. Hashed with bcrypt for storage.

Passwordless Magic Link

Log in without a password using a secure, one-time email link. Proves email ownership on every login, similar to two-factor authentication.

Google OAuth

Sign in with your Google account for streamlined access. Leverages Google's own security infrastructure, including their two-factor authentication.

Email Verification

Every account must verify their email address before gaining access. Unverified accounts are blocked from logging in.

Sudo Mode

Sensitive operations like changing your password or email require re-authentication within a 20-minute window, preventing unauthorized changes even with an active session.

Rate Limiting

Automated abuse protection limits registration attempts per IP address, preventing brute-force attacks and account enumeration.

Infrastructure & Data Protection

Enterprise-grade infrastructure with defense-in-depth protections at every layer of the stack.

Infrastructure and data protection security diagram

HTTPS & HSTS

All connections are encrypted with TLS. HTTP Strict Transport Security is enforced with a one-year max-age, preload, and subdomains included.

Content Security Policy

Nonce-based Content Security Policy prevents cross-site scripting (XSS) and clickjacking attacks. Inline scripts are restricted to cryptographically verified sources.

US-East Data Residency

Application servers and databases are hosted in US-East-1 (Northern Virginia). Documents are stored in AWS S3 with server-side encryption in the same region.

Session Management

Sessions expire after 14 days with automatic renewal. Session IDs are regenerated on login to prevent fixation attacks. All sessions are invalidated on password change.

CSRF & Injection Protection

All form submissions are protected against cross-site request forgery. Parameterized queries prevent SQL injection. OAuth flows use state parameters to prevent CSRF.

Signed Cookies

Session data is stored in cryptographically signed cookies with SameSite protection, preventing tampering and cross-site attacks.

Security Contact

If you discover a security vulnerability, we encourage responsible disclosure. Please report any security concerns to our dedicated security team.

security@nimbbo.com

We acknowledge all reports within 48 hours and work to resolve confirmed vulnerabilities promptly.

Compliance Standards

Mercando's architecture is designed to meet and exceed the most demanding regulatory frameworks in financial services and data protection.

SOC 2 Type II Ready

Our controls are designed to meet SOC 2 Type II requirements across security, availability, and confidentiality trust service criteria.

GDPR Ready

Full compliance with the General Data Protection Regulation, including data minimization, consent management, right to erasure, and data processing agreements.

ISO 27001 Compatible

Our information security management system aligns with ISO 27001 controls, providing a systematic approach to managing sensitive company information.

HIPAA Architecture Ready

Built with the technical safeguards required by HIPAA, including encryption, access controls, audit logging, and automatic session management for healthcare data.

Zero-Knowledge Encryption

Your Documents, Your Keys, Your Control

With Zero-Knowledge encryption enabled, your documents are encrypted directly in your browser using AES-256 before they ever leave your device. The encryption key never touches our servers.

Client-Side Encryption

Encryption happens in your browser using the Web Crypto API. Your plaintext data never leaves your device.

You Hold the Key

The encryption key is generated and stored locally. Without it, the encrypted file is unreadable -- even to Mercando staff and infrastructure.

Seamless Decryption

When you or an authorized recipient downloads the file, decryption happens automatically in the browser. The experience is transparent and effortless.

How Zero-Knowledge Works

1

Select Document

Choose file and enable client-side encryption

2

Browser Encrypts

AES-256 encryption happens locally in your browser

3

Encrypted Upload

Only encrypted data reaches Mercando servers

4

Secure Storage

Stored encrypted -- unreadable without your key

Ready to secure your document exchange?

Join companies that trust Mercando to protect their most sensitive compliance documents. Start for free with full security features included.

Sign Up Free