Encryption in transit and at rest
Browser and API traffic uses modern TLS. Sensitive configuration (such as connected email credentials) is stored encrypted where applicable. This reduces exposure if underlying storage is ever compromised.
MauzoSync is built so safari operators and DMCs can run sales, itineraries, and operations without trading security for speed. Below is how we approach protection of your data and your travelers’ trust—not an audit report, but the practices that underpin the platform.
Why it matters
You store inquiries, itineraries, guest details, supplier contacts, and financial flows. A breach would harm your brand and your partners. We design MauzoSync so each operator’s environment stays separate, access is intentional, and encryption and monitoring are baseline—not optional extras.
Browser and API traffic uses modern TLS. Sensitive configuration (such as connected email credentials) is stored encrypted where applicable. This reduces exposure if underlying storage is ever compromised.
We run on reputable cloud infrastructure with patching, monitoring, and defensive practices aligned to common threat models. Environments are segmented so a failure in one layer is less likely to cascade.
Sessions and passwords follow current best practices. We encourage strong credentials and provide role-aware access so only the right people reach sensitive workflows.
Admins, sales, operations, and finance see what their role requires—reducing accidental leaks and limiting damage from stolen laptops or shared passwords.
Important actions leave traces so managers can reconcile who changed pricing, status, or financial records—critical when multiple people touch the same safari.
We maintain backups to recover from hardware failures and operational mistakes. Recovery objectives depend on plan and infrastructure—ask us for specifics if you need them in contract form.
Each operator’s data is logically separated. Your inquiries, clients, and suppliers are not visible to other MauzoSync customers. Multi-tenancy is implemented so application queries and permissions enforce boundaries—not just folder names on disk.
If you discover a vulnerability or suspicious activity related to MauzoSync, contact support@mauzosync.com with a clear description and steps to reproduce. We take reports seriously and work to remediate validated issues promptly. Please do not perform testing that could harm other customers’ data or availability.
For how we handle personal data, see our Privacy Policy. Enterprise customers may request additional documentation or questionnaires through the same channel.
Security is part of the product—not an afterthought.
Book a demo to walk through access control, data flows, and how we support operators who need to answer client and partner security questions.