We handle your most sensitive manufacturing data-RFQ specifications, vendor relationships, and pricing intelligence. Your trust is our responsibility. BlastRFQ is built on industry-standard security practices and transparent safeguards.
All data encrypted in transit
Database security with RLS
Complete data isolation
All data transmitted to and from BlastRFQ is encrypted using TLS 1.3, the industry standard for secure communication. Your RFQ specifications, vendor quotes, and pricing data are protected at every step.
We use Clerk as our authentication provider-trusted by thousands of companies to secure user access. Authentication is just the first step. Role-based access controls ensure that only authorized team members can view sensitive data.
Buyers and vendors operate in completely isolated environments. A vendor cannot see other vendors' bids, and a buyer cannot see another buyer's RFQ specs. This separation is enforced at the database level, not just in the UI.
BlastRFQ runs on Supabase, a PostgreSQL-based backend with built-in security features. Every query respects row-level security (RLS) policies that enforce data isolation at the database layer-no account can access data it shouldn't see, even if a bug exists in the application.
AWS with geographic redundancy
PostgreSQL with enterprise upgrades
SOC 2, HIPAA-ready infrastructure
99.9% guaranteed availability
BlastRFQ uses Stripe for all payment processing. We never touch, store, or see your credit card information-Stripe handles all payment processing with PCI Level 1 certification, the highest standard in the industry.
This means your billing information is as protected as payments on Amazon, Shopify, and other trusted platforms. Your RFQ data and your payment data are completely separate systems.
PCI DSS Compliance: By using Stripe for payments, BlastRFQ avoids the complexity of storing sensitive cardholder data. This reduces attack surface and ensures compliance with PCI Data Security Standards.
BlastRFQ is deployed on Vercel, the platform built by the creators of Next.js. Vercel provides edge computing, automatic HTTPS, DDoS protection, and global CDN distribution for low latency and high availability.
Next.js on Vercel Edge Network
Next.js API Routes with RLS middleware
Supabase (PostgreSQL) with row-level security
Clerk (SSO-ready, MFA support)
Stripe (PCI Level 1)
Uptime tracking & error monitoring
We take security seriously at every level. Here are the practices we follow to protect your data.
We keep all dependencies, frameworks, and infrastructure up to date with the latest security patches.
Automated scanning for known vulnerabilities in dependencies. Manual code review for each release.
Limited team access. Internal admin tools require multi-factor authentication and audit logging.
All API keys and secrets are stored securely using environment variables and never committed to code.
Real-time monitoring of application performance, error rates, and security events with automated alerts.
We never share customer data with third parties. Your RFQ specs and pricing data are yours alone.
We take security vulnerabilities seriously and appreciate responsible disclosure. If you discover a potential security issue, please report it directly to us rather than posting publicly.
Please send a detailed description of the vulnerability to:
nick@blastrfq.comInclude: steps to reproduce, affected component, potential impact, and your recommended fix (if any).
Please do not: Publicly disclose the vulnerability until we have had time to investigate and release a fix. We will credit you in the fix notes if you wish and provide a responsible disclosure timeline.
We understand that your RFQ specifications are proprietary manufacturing IP. Your vendor relationships and pricing intelligence are competitive advantages. BlastRFQ is built on the principle that your data is yours alone.
We're happy to discuss security practices, compliance requirements, or any concerns you have. Reach out to our support team.