Your data security is
our top priority
We implement industry-leading security measures to protect your business data. Built on enterprise-grade infrastructure with compliance at its core.
TLS 1.3
Encrypted in TransitAES-256
Encrypted at RestAzure
Southeast Asia RegionPDPA
Malaysia CompliantBuilt with security in mind
We take a defense-in-depth approach to protecting your data across all layers of our platform.
Security isn't an afterthought at Leja. From the moment you sign up, your data is protected by multiple layers of enterprise-grade security controls.
- End-to-end encryption
All data is encrypted both in transit and at rest using industry-standard protocols.
- Regular security audits
Our systems undergo regular penetration testing and vulnerability assessments.
- 24/7 monitoring
Our security team monitors for threats and anomalies around the clock.
99.9% Uptime
Enterprise-grade reliability for your business operations
Military-grade encryption
Your data is protected with the same encryption standards used by banks and government agencies.
In Transit
All data transmitted between your browser and our servers is protected by TLS 1.3, the latest and most secure transport layer protocol.
- TLS 1.3 encryption
- HTTPS everywhere
- Perfect forward secrecy
- HSTS enabled
At Rest
All stored data is encrypted using AES-256, the gold standard for data-at-rest encryption used by financial institutions worldwide.
- AES-256 encryption
- Encrypted backups
- Key management via Azure
- Secure key rotation
Enterprise cloud infrastructure
Hosted on Microsoft Azure with data residency in Southeast Asia for optimal performance and compliance.
Microsoft Azure
Southeast Asia Region
SOC 2
Type II CertifiedISO 27001
CertifiedGDPR
Compliant99.99%
SLA UptimeWhy Azure?
Data Residency
Your data is stored in Microsoft Azure's Southeast Asia data center in Singapore, ensuring low latency and compliance with regional data protection requirements.
Physical Security
Azure data centers feature 24/7 security, biometric access controls, video surveillance, and multiple layers of physical security barriers.
Redundancy
Data is automatically replicated across multiple availability zones for high availability and disaster recovery.
Regular Backups
Automated daily backups with point-in-time recovery capability up to 35 days.
Secure access management
Control who can access what with granular role-based permissions and multi-factor authentication.
Role-Based Access
Define custom roles with specific permissions. From Employee to CEO, control exactly what each user can see and do.
Multi-Factor Auth
Add an extra layer of security with MFA support. Works with authenticator apps for secure login verification.
Session Management
Automatic session timeout, device tracking, and the ability to remotely log out from all devices.
Built for Malaysian regulations
Full compliance with Malaysian statutory requirements and data protection laws.
PDPA Malaysia
Fully compliant with the Personal Data Protection Act 2010. We implement all seven data protection principles:
- General Principle (consent)
- Notice and Choice Principle
- Disclosure Principle
- Security Principle
- Retention Principle
- Data Integrity Principle
- Access Principle
Statutory Compliance
Built-in compliance features for Malaysian business requirements:
- LHDN: e-Invoice (MyInvois) integration
- EPF: Monthly contribution calculations
- SOCSO: Employment injury scheme
- EIS: Employment insurance system
- PCB: Monthly tax deduction
- EA Form: Annual tax statement generation
Continuous security improvement
Our security team works around the clock to identify and address potential threats.
Penetration Testing
Regular security assessments by independent third-party firms to identify vulnerabilities.
Vulnerability Scanning
Automated daily scans to detect and patch security vulnerabilities promptly.
Security Training
All team members undergo regular security awareness training and certification.
Secure Development
Code reviews, static analysis, and security testing are part of our development process.
Incident Response
In the unlikely event of a security incident, we have a comprehensive response plan to minimize impact and keep you informed.
Detection & Analysis
24/7 monitoring with automated threat detection
Containment
Immediate isolation of affected systems
Notification
Affected users notified within 24 hours
Recovery & Review
Full restoration and post-incident analysis
Response Commitments
Report a Vulnerability
Found a security issue? We appreciate responsible disclosure. Contact our security team.