Software
Rantir Cloud
Data & Authentication
Easy as a spreadsheet. Powerful as a database.
Integrations & Logic
Connect your Stack & Build AI Agents
AI Visual Builder Coming Soon
Powerful websites & dashboards with AI
Rantir Studio
Rantir Studio Overview
Drawtir SDK
Animation, UI & Graphic Design
Webtir SDK
Web-builder AI Framework
Documentation
Rantir Cloud DocumentationGet Support
View how Rantir Cloud is a leading AI platform for your industry
Get started with Rantir
Services
Rantir Enterprise Partner
Rantir with Framer
Rantir with Webflow
Rantir with Shopify
Rantir where you work
Rantir and Lovable
Rantir and V0
Rantir and Wordpress
Rantir & Cursor AI
Rantir and Bolt
Rantir and Windsurf
Solutions For
All ServicesFor ConstructionFor HealthcareFor AgencicesFor Enterprise
Get started with Rantir
Enterprise
Research
Pricing
Data
·
Logic
·
Visual Builder
Explore Rantir Cloud
Rantir Studio
·
Drawtir
·
Webtir
Explore Rantir Studio & Drawtir and Webtir SDKs
Construction
·
Healthcare
·
Agencies
Showcase your projects just the way you like.
About
How we think, work, and approach design.
Enterprise
The era of personalized software is here
Rantir Research
·
Documentation
Get insights into Rantir, what we are building and our researh we are working on
Pricing
·
Schedule a Demo
·
Support
Just say hi. We’re always curious to hear what you’re building.
Visit BYQ.supply
Get Started
Updated 08.23.2025

Security Policy

Get Access to support if you have questions regarding this document:
We support companies with deep privacy needs. Please see our privacy policy below. For customization, reselling Rantir or other commercial goals and needs for your company please reach out to hello@rantir.com or support@rantir.com.
A Holistic Approach to Rantir's Security attributes as defined below
Rantir's provide safeguarding an organization’s assets, data, and operations through our Run Times and Backup features within RantirApp. Below, I’ve outlined five key paragraphs to guide you:
Type:
Security Policy
Last updated 08.23.2025
At Rantir, we pride ourselves on delivering high-quality services to our clients for frontend development and a software layer where we create AI automations and integrations. Our mission is to provide innovative solutions to create AI application that meet their needs while maintaining the highest standards of professionalism, integrity, and security.

How Rantir Security Policy works:

A robust security policy serves as the foundation for an organization’s security posture lies within our automation and integration features, specifically our run-times and backups within a secure Postgres db, private and not shared to any other customer within an cloud provider (or hosting). It outlines the principles, guidelines, and responsibilities related to information security. Here are the key components to include:

  • Your Cloud instance is private: This means that no other client of Rantir can access your instance, and it is installed on a private server. The following policy and specify the systems, data, and personnel it covers.
  • Roles and Responsibilities: Identify roles (e.g., CISO, IT staff, end-users) and their responsibilities in maintaining security as Rantir's Lead Engineer, CTO and CEO of Rantir, Inc.
  • Compliance and Legal Framework: Acknowledge relevant laws, regulations, and industry standards (e.g., GDPR, HIPAA).
  • Risk Assessment: Describe how risk assessments will be conducted and how risks will be mitigated.

‍

Access Control and Authentication

Access control ensures that only authorized individuals can access resources. Consider the following aspects:

  • User Authentication: Specify authentication methods (e.g., passwords, multi-factor authentication) and enforce strong password policies are within an private server, not share among other clients.
  • Authorization: Define access levels (read, write, execute) based on roles.
  • Least Privilege: Implement the principle of least privilege—users should have the minimum access necessary to perform their tasks.
  • Audit Trails: Log access events and regularly review audit logs.

‍

Data Protection and Encryption

Protecting sensitive data is paramount. Address the following:

  • Data Classification: Classify data (public, internal, confidential) and apply appropriate controls.
  • Encryption: Encrypt data at rest (disk encryption) and in transit (TLS/SSL).
  • Key Management: Safely manage encryption keys.
  • Data Loss Prevention (DLP): Implement DLP solutions to prevent data leaks.

‍

Incident Response and Business Continuity

Prepare for security incidents and ensure business continuity in Rantir's Risk Assessment and Planning process. Rantir Business continuity ensures resilience during disruptions. We identify Risk Assessment as regularly assess potential threats, including natural disasters, cyberattacks, and supply chain disruptions. Understand their impact on critical business operations. We Identify essential processes, dependencies, and recovery time objectives (RTOs). Prioritize resources based on their criticality Then we develop a comprehensive plan that outlines how the organization will continue operating during disruptions. Include communication strategies, resource allocation, and alternative work arrangements

‍Backup and Redundancy Plan: Data protection and redundancy are key components of business continuity:

      • Data Backup: Regularly back up critical data. Test backups to ensure they are usable during recovery. Consider both on-site and off-site backups.
      • Redundancy: Implement redundancy for essential systems. This might involve redundant servers, failover mechanisms, or geographically distributed data centers.
    • 3. Testing and Drills: Regular testing ensures that your business continuity plans work effectively:
      • Tabletop Exercises: Conduct simulated scenarios with key stakeholders. Validate the BCP and response procedures. Identify areas for improvement.
      • Disaster Recovery (DR) Drills: Test the technical aspects of recovery, such as failover, data restoration, and system availability.

    Employee Training and Awareness

    People are often the weakest link. Invest in security awareness:

    • Training Programs: Regularly educate employees on security best practices.
    • Phishing Awareness: Teach employees to recognize phishing attempts.
    • Social Engineering: Raise awareness about social engineering tactics.
    • Reporting Incidents: Encourage employees to report security incidents promptly.

    ‍

    Compliance with Legal Standards

    Rantir, Inc. complies with all applicable data protection laws and regulations, including the General Data Protection Regulation (GDPR) limited and the California Consumer Privacy Act (CCPA) limited. By adhering to these legal standards, we ensure that our data protection practices meet the highest levels of scrutiny and accountability. With our data protection policy program we adhere each platform as an ongoing process, and we are committed to continuously improving our practices. We stay abreast of the latest developments in data security and privacy to ensure that our measures remain effective and up-to-date.

    ‍

    Feedback from users and stakeholders is invaluable in this process, helping us to refine our policies and enhance our services. At Rantir, Inc., we are dedicated to maintaining a secure and trustworthy platform for all our users.

    The next generation of personalized software.
    G2
    star iconstar iconstar iconstar iconstar icon
    620+ Reviews
    "The community & partners program behind Rantir is intense. The amount the community has developed in 2-3 months has been wild. If you want a new Journey build a template with Rantir. "
    Jilian Day
    Head of Marketing, Rantir
    Join the Rantir Discord Community
    FAQs & Support
    Get support & ask questions
    Arrow up right icon
    Rantir Research
    Read our papers and blog
    Arrow up right icon
    Documentation & Changelog
    View our Guides and API Docs
    Arrow up right icon
    Join the Community
    Over 330+ Rantir Vibe Coders
    Arrow up right icon
    Cloud Software
    Rantir StudioData & AuthoLogic and WorkflowsTIR + Open Source API & EmbedsIntegrations WorkflowsPricingManifesto
    Services
    All ServicesEnterprise
    Software Partners
    Rantir with Framer
    Rantir with Webflow
    Rantir with Shopify
    Rantir and Lovable
    Rantir and V0
    Rantir and Wordpress
    Rantir & Cursor AI
    Rantir and Bolt
    Rantir and Windsurf
    Company
    About UsRantir ResearchDocumentationFair-Use OS LicenseContact Rantir SalesRequest Demo
    Markets
    For ConstructionFor HealthcareFor EnterpriseFor Agencies
    Support
    hello@rantir.comSupport TicketsGet StartedLogin
    Privacy PolicyData ClassificationData PolicyCompany Services PolicySecurity PolicySuprocessors DisclaimerTerms and ConditionsLicensing
    Main logo link that leads to home page
    © Designed by Medium Rare, Developed by Webtir & powered by Rantir
    googleinstagramlinkedinbluesky
    If the software is used in conjunction with third-party AI APIs—including but not limited to OpenAI, Google Gemini, Anthropic, AWS Bedrock, or similar systems—the user is responsible for ensuring that their chosen AI provider complies with their own organization’s privacy and data-handling requirements. When the user supplies their own API keys for any such provider, Rantir makes no copies of those keys and does not facilitate their use beyond forwarding requests directly to the provider under the user's explicit instruction within Rantir Cloud or Rantir Studio. In these cases, the user’s data is governed by the data policies of the external AI provider, and the user is responsible for reviewing those terms. All Rantir Products are under the parent company called Hexigon AI, Inc. a Colorado, USA s-corp.