Security built into every layer
Your customer data, financials, and business operations deserve real protection — not an afterthought. Pillar enforces data isolation, access control, and input validation at the architecture level.
Protection at every level
From database queries to API responses, security controls are enforced automatically — not configured manually.
Data Isolation
Every query is scoped to your company. Tenant context is enforced automatically so data never leaks between accounts.
Role-Based Access Control
Four distinct roles — Owner, Dispatcher, Technician, Customer — each with enforced API-level permissions.
Token-Based Authentication
Short-lived access tokens with automatic refresh. Tokens are stored securely and protected against common web attacks.
Rate Limiting
Global and per-endpoint rate limits protect against brute-force attacks and API abuse.
Input Validation
Every request is validated with strict type checking. Unknown properties are stripped or rejected.
Audit Logging
Twenty event types tracked with actor, target, IP address, and change history. Available on the Enterprise plan.
Your data stays yours
Every record in the system is scoped to your company. Tenant context is enforced on every request — there is no way to accidentally access another company's data.
Row-level data separation
Every record is scoped to your company for complete row-level data isolation.
Automatic tenant context
Company scope is enforced on every request automatically — no manual filtering required.
Subdomain detection
Each company gets its own branded subdomain with automatic routing and isolation.
Per-company uniqueness
Job numbers, invoice numbers, and other sequences are unique within each company, not globally.
Multi-Tenant Architecture
Precision Plumbing
precision.pillar.com
Summit Roofing
summit.pillar.com
Sparkle Clean Services
sparkle.pillar.com
Complete row-level isolation ensures no data crosses company boundaries
Role Permissions
Four roles, clear boundaries
Every endpoint is protected by role-based permissions. Owners see everything. Dispatchers manage operations. Technicians see their jobs. Customers see only their own data.
Owner
Full access to all features, settings, and billing.
Dispatcher
Manage jobs, schedules, and customers. No admin access.
Technician
View assigned jobs, clock time, complete checklists.
Customer
Portal access to their own jobs, invoices, and equipment.
Secure by default, not by configuration
JWT tokens, password hashing, and session management are handled for you. No security plugins to install or configure.
Short-Lived Tokens
Access tokens expire quickly and are automatically refreshed, keeping sessions secure at all times.
Secure Password Storage
Passwords are salted and hashed with industry-standard algorithms. Plain text is never stored.
XSS-Protected Sessions
Session tokens are stored securely and protected against cross-site scripting attacks.
Multi-View Switching
Users with multiple roles switch views without re-authenticating. Session stays secure.
Abuse prevention at every endpoint
Global and per-endpoint rate limits protect your account from brute-force attacks, credential stuffing, and API abuse.
Enforced Limits
Global API
Per-IP baseline protection
Login
Prevents credential stuffing
Registration
Prevents mass account creation
Password Reset
Prevents reset abuse
Sensitive Actions
Per-token rate limiting
Every input validated, every output sanitized
Strict type checking is enforced on every request. Unknown properties are rejected. Inputs are validated before they reach business logic.
Strict Type Checking
Every endpoint validates request bodies against strict schemas. Invalid data is rejected before reaching business logic.
Property Filtering
Unknown properties in request bodies are automatically rejected. Only expected fields are accepted.
Server-Side Validation
All user-submitted content is validated server-side on every endpoint. Type checking, length limits, and format constraints prevent malicious payloads from reaching the database.
Input Normalization
Emails and other identifiers are normalized automatically, preventing duplicate accounts and inconsistencies.
Cross-Origin Protection
Cross-origin requests are restricted by environment, preventing unauthorized access from external domains.
Soft Delete for Compliance
Deleted records are preserved with timestamps for audit trails and regulatory compliance.
Know exactly who did what, and when
Logins, password changes, role assignments, and account lifecycle events are tracked automatically. Each entry captures the actor, target, and change details.
Recent Audit Events
Team member signed in via web browser
Team member role updated from Technician to Dispatcher
Unrecognized email — invalid credentials
Team member account deactivated by owner
Security across the platform
These features build on and extend the security foundation.
See how Pillar protects your data
Schedule a demo and we will walk through the security architecture — data isolation, role controls, audit logging, and how it all works in practice.