Pillar
Pillar
Platform

Security built into every layer

Your customer data, financials, and business operations deserve real protection — not an afterthought. Pillar enforces data isolation, access control, and input validation at the architecture level.

Multi-Tenant IsolationRole-Based AccessJWT AuthenticationRate LimitingAudit Logging

Protection at every level

From database queries to API responses, security controls are enforced automatically — not configured manually.

Data Isolation

Every query is scoped to your company. Tenant context is enforced automatically so data never leaks between accounts.

Role-Based Access Control

Four distinct roles — Owner, Dispatcher, Technician, Customer — each with enforced API-level permissions.

Token-Based Authentication

Short-lived access tokens with automatic refresh. Tokens are stored securely and protected against common web attacks.

Rate Limiting

Global and per-endpoint rate limits protect against brute-force attacks and API abuse.

Input Validation

Every request is validated with strict type checking. Unknown properties are stripped or rejected.

Audit Logging

Twenty event types tracked with actor, target, IP address, and change history. Available on the Enterprise plan.

Data Isolation

Your data stays yours

Every record in the system is scoped to your company. Tenant context is enforced on every request — there is no way to accidentally access another company's data.

Row-level data separation

Every record is scoped to your company for complete row-level data isolation.

Automatic tenant context

Company scope is enforced on every request automatically — no manual filtering required.

Subdomain detection

Each company gets its own branded subdomain with automatic routing and isolation.

Per-company uniqueness

Job numbers, invoice numbers, and other sequences are unique within each company, not globally.

Multi-Tenant Architecture

Precision Plumbing

precision.pillar.com

Isolated

Summit Roofing

summit.pillar.com

Isolated

Sparkle Clean Services

sparkle.pillar.com

Isolated

Complete row-level isolation ensures no data crosses company boundaries

Role Permissions

Company Settings
O
Jobs & Scheduling
OD
Technician Profiles
OD
Field Work & Time
ODT
Invoices & Payments
OD
Customer Portal
C
Audit Logs
O
Access Control

Four roles, clear boundaries

Every endpoint is protected by role-based permissions. Owners see everything. Dispatchers manage operations. Technicians see their jobs. Customers see only their own data.

Owner

Full access to all features, settings, and billing.

Dispatcher

Manage jobs, schedules, and customers. No admin access.

Technician

View assigned jobs, clock time, complete checklists.

Customer

Portal access to their own jobs, invoices, and equipment.

Authentication

Secure by default, not by configuration

JWT tokens, password hashing, and session management are handled for you. No security plugins to install or configure.

Short-Lived Tokens

Access tokens expire quickly and are automatically refreshed, keeping sessions secure at all times.

Secure Password Storage

Passwords are salted and hashed with industry-standard algorithms. Plain text is never stored.

XSS-Protected Sessions

Session tokens are stored securely and protected against cross-site scripting attacks.

Multi-View Switching

Users with multiple roles switch views without re-authenticating. Session stays secure.

Rate Limiting

Abuse prevention at every endpoint

Global and per-endpoint rate limits protect your account from brute-force attacks, credential stuffing, and API abuse.

Enforced Limits

Global API

Per-IP baseline protection

Throttled

Login

Prevents credential stuffing

Strict

Registration

Prevents mass account creation

Strict

Password Reset

Prevents reset abuse

Strict

Sensitive Actions

Per-token rate limiting

Strict

Every input validated, every output sanitized

Strict type checking is enforced on every request. Unknown properties are rejected. Inputs are validated before they reach business logic.

Strict Type Checking

Every endpoint validates request bodies against strict schemas. Invalid data is rejected before reaching business logic.

Property Filtering

Unknown properties in request bodies are automatically rejected. Only expected fields are accepted.

Server-Side Validation

All user-submitted content is validated server-side on every endpoint. Type checking, length limits, and format constraints prevent malicious payloads from reaching the database.

Input Normalization

Emails and other identifiers are normalized automatically, preventing duplicate accounts and inconsistencies.

Cross-Origin Protection

Cross-origin requests are restricted by environment, preventing unauthorized access from external domains.

Soft Delete for Compliance

Deleted records are preserved with timestamps for audit trails and regulatory compliance.

Audit LoggingPro

Know exactly who did what, and when

Logins, password changes, role assignments, and account lifecycle events are tracked automatically. Each entry captures the actor, target, and change details.

Login SuccessLogin FailurePassword ChangeRole ChangeAccount CreateAccount DeactivateToken RefreshView Assignment

Recent Audit Events

Login Success
2 min ago

Team member signed in via web browser

Role Change
1 hr ago

Team member role updated from Technician to Dispatcher

Login Failure
3 hrs ago

Unrecognized email — invalid credentials

Account Deactivate
1 day ago

Team member account deactivated by owner

Security across the platform

These features build on and extend the security foundation.

See how Pillar protects your data

Schedule a demo and we will walk through the security architecture — data isolation, role controls, audit logging, and how it all works in practice.