Trust & Security

Security for operational data and AI workflows.

Keycard is built for dealers, distributors, and contractors whose work order, customer, equipment, and integration data must stay protected. We apply layered controls across access, encryption, infrastructure, and customer data isolation.

We keep security reviews practical: clear documentation, straightforward answers, and reports available to customers evaluating Keycard for production use.

Enterprise-grade posture

Encrypted in transit and at rest
Revocable integration credentials
Reports available under NDA

Comprehensive reports of our policies and procedures are available on request.

How we protect data

Controls across every layer.

Access management

Access to production systems is limited to authorized personnel and protected with multi-factor authentication.

Infrastructure

Keycard runs on enterprise-grade cloud infrastructure with managed security controls and environment isolation.

Customer boundaries

Customer data is logically segregated, and application permissions are designed around role-based access patterns.

AI data usage

Customer data is not used to train models outside your organization. Data can be removed on request.

Encryption, everywhere

  • Revocable API keys encrypted with AES algorithms.
  • HTTPS with TLS for data in transit.
  • Automatic encryption at rest.

Security operations

  • Continuous codebase scanning for vulnerabilities.
  • Multi-factor authentication enforced for access points.
  • Cloud infrastructure on enterprise-grade providers.

Data control & privacy

  • Your data is never used to train models outside your organization.
  • Customer data is strictly logically segregated.
  • Role-based access controls protect sensitive workflows.

Continuous monitoring

Automated checks through Vanta.

Keycard uses Vanta to automate security evidence collection and continuously monitor core controls. This helps us catch gaps earlier, keep review materials current, and reduce one-off manual evidence gathering.

Cloud infrastructure configuration
Employee device security
Identity and access controls
Policy acknowledgements
Vulnerability and vendor evidence

Vanta is trusted by teams at

AtlassianSnowflakeDuolingoRampGitHubIntercomPerplexityCursor

Security review

Documentation without the runaround.

Customers evaluating Keycard can request a concise security packet covering our controls, data handling, and operating practices. We can also work through vendor-security questions with your internal IT or compliance team.

Available materials

  • Security policies and procedures
  • Infrastructure and access-control overview
  • Data handling and AI usage summary
Request access
Keycard

Automating work order documentation and service operations for heavy equipment dealers and contractors.

AED member logo

© 2026 Keycard Inc. All rights reserved.