Security

Security at PILLAR

PILLAR is purpose-built for revenue teams in regulated industries. Your data stays in your control, encrypted at rest and in transit, isolated per organization, and never used for model training or shared with third parties.

Architecture overview

Multi-Tenant Isolation

Every database query is scoped by organization ID through PostgreSQL Row-Level Security (RLS). Customer A cannot access Customer B's data at the database level, regardless of application logic. This is enforced by the database engine itself, not by application code.

No AI Inference in the Data Path

PILLAR's scoring engine is deterministic mathematics, not LLM-based inference. Your data never flows through OpenAI, Anthropic, or any third-party AI model endpoint. Scores are computed via weighted formulas on your PostgreSQL database. No data leaves the database boundary except to write scores back to your own CRM.

Encryption

At rest: AES-256 encryption on all database storage (managed by Supabase/AWS). API keys and OAuth tokens are additionally encrypted at the application layer before storage.

In transit: TLS 1.2+ on all connections. HSTS enforced. No plaintext endpoints.

Authentication & Access

User authentication via Supabase Auth (bcrypt-hashed passwords, session tokens). OAuth 2.0 for CRM and third-party integrations. API keys for MCP server access are stored as SHA-256 hashes. Role-based access controls limit what each user role can see and do.

Infrastructure partners

PILLAR runs on enterprise-grade infrastructure from partners who maintain their own compliance certifications.

ProviderPurposeRegionCertifications
Supabase (AWS)Database, authentication, RLSUS East (Virginia)SOC 2 Type IIHIPAA eligible
VercelApplication hosting, edge networkUS (multi-region)SOC 2 Type II
CloudflareMarketing site hosting, CDN, DDoS protectionGlobalSOC 2 Type IIISO 27001
GitHubSource code repository (private)USSOC 2 Type II

For a complete list of sub-processors, see the Sub-Processor List.

Data handling

What PILLAR processes

What PILLAR does not process

FERPA Position

PILLAR processes revenue operations metadata about education organizations (district names, contract values, administrator contact information). PILLAR does not store, process, or have access to student educational records as defined under the Family Educational Rights and Privacy Act (FERPA). PILLAR is a revenue operations tool used by the vendor's sales and customer success teams, not by educators or students.

Data Retention

Data Portability

Customers can export all of their data at any time via the PILLAR dashboard or MCP API. Upon termination, PILLAR provides a complete data export in standard formats (CSV, JSON) within 5 business days of request.

Operational security

Incident Response

PILLAR maintains an incident response process. In the event of a confirmed data breach affecting customer data, PILLAR will notify affected customers within 72 hours of confirmation, consistent with GDPR Article 33 timelines. Notification includes: nature of the incident, data affected, remediation steps taken, and point of contact for questions.

Vulnerability Management

Access Controls

Compliance documentation

The following documents are available upon request or during procurement:

Last updated: April 2026. For security inquiries, contact security@pillargtm.com
Weekly Blueprint
Join The Architects - our weekly newsletter for EdTech and public sector revenue leaders
Subscribe →