Security at Apex Estimate

We understand that your project data is sensitive and critical to your business. We are deeply committed to protecting your information through a multi-layered security approach, from our infrastructure to our application.

Last updated: June 27, 2025

Enterprise-Grade Infrastructure

Our entire platform is built on Google Cloud Platform (GCP), a world-class infrastructure provider that meets rigorous security and compliance standards.

End-to-End Encryption

Your data is encrypted at all times. We use TLS 1.2+ for data in transit and industry-standard encryption for data at rest in our databases and file storage.

Secure File Handling

Your blueprints and spec books are uploaded directly from your browser to our secure cloud storage via temporary, pre-signed URLs, minimizing exposure.

Role-Based Access Control

Our platform supports distinct user roles. Admins can manage company-wide settings and billing, while Estimators can focus on creating projects.

Secure AI Processing

We partner with Google to use their Gemini API for document analysis. Your data is processed securely and is governed by Google's robust privacy and security policies.

Your Security Responsibilities

You play a vital role in security. We encourage you to use strong, unique passwords and never share your account credentials with others.

Technical Security Details

Network Security

Our application infrastructure is housed within a private, isolated Virtual Private Cloud (VPC) on GCP. We use strict firewall rules and network segmentation to separate our application servers, databases, and processing workers, drastically limiting the attack surface.

Authentication and Authorization

User authentication is handled via a secure, token-based system (JWT). This ensures that every request to our backend is verified and authenticated. Our permission system enforces multi-tenancy at the database level, meaning your data is logically and strictly isolated from all other customer data.

Data Privacy and Ownership

As stated in our Terms of Service, you retain full ownership of the project data you upload. We act only as a processor for your data. We may use anonymized, aggregated data to improve our AI models, but we will never use your specific, identifiable project data for training without your explicit consent.

Reporting a Concern

If you believe you have discovered a security vulnerability or have a security concern, please contact us immediately at contact@apexestimate.com. We take all reports seriously and will investigate promptly.

Apex AI Assistant

Hello! How can I help you with your estimation needs today?