Skip to content

Security that scales with your trust.

We believe mediation should be verifiable, not just trustworthy. Every auction is cryptographically signed. Every decision is auditable.

Security by design

Security isn't a feature we added—it's how we built the platform from day one.

Cryptographic Transparency

Every auction produces a signed, tamper-evident log. You can verify any decision we make.

  • Ed25519-signed auction logs
  • Exportable for independent verification
  • Immutable audit trail

Data Minimization

We collect only what's necessary for mediation. No fingerprinting, no cross-app tracking.

  • No device fingerprinting
  • No cross-publisher data sharing
  • Configurable data retention

Publisher Control

You decide which networks participate, what data they receive, and how long logs are retained.

  • Per-network data policies
  • Granular consent handling
  • Self-service data deletion

Privacy-first architecture

We believe privacy and monetization can coexist. Your users' data stays in your hands.

No fingerprinting

We don't collect or infer device identifiers beyond what you explicitly pass.

No cross-publisher sharing

Your user data is never shared with other publishers on our platform.

GDPR & CCPA ready

Built-in consent handling and data subject request support.

Configurable retention

Set your own retention periods. Delete data on demand.

Reliability you can count on

We treat downtime as seriously as you do. Our infrastructure is designed for high availability with published failover targets and clear SLO commitments.

SLO Dashboard

View current regions and public SLO commitments at apexmediation.ee/slo

99.9%
Uptime SLO
<200ms
Latency (p95)
<30s
Failover target

Compliance & certifications

We meet the standards your legal and security teams require.

GDPR Compliant

Full EU data protection compliance

CCPA Ready

California Consumer Privacy Act support

IAB TCF 2.2

Transparency & Consent Framework

COPPA Compliant

Children's privacy protection

Don't trust us. Verify.

Every auction produces a cryptographically signed log. Export it, verify it, audit it independently. We built Apex for publishers who demand proof, not promises.

Security Pack Contents

System architecture diagram
Threat model & mitigations
Data flow documentation
Encryption & key management
GDPR/CCPA compliance checklist
Penetration test summary
Signed log verification guide
Vendor security questionnaire