Tenant isolation
The architecture requires tenant-owned records to carry organization scope and encourages event scope where possible for safer filtering and policy design.
Security
The product model depends on tenant isolation, audited access paths, signed preview controls, request correlation, and reliable background operations across public and admin surfaces.
Security pillars
Eventberry ties routing, preview controls, auditability, and operational reliability together because those concerns overlap in real event systems.
The architecture requires tenant-owned records to carry organization scope and encourages event scope where possible for safer filtering and policy design.
Internal platform and support access is intended to use audited elevated pathways rather than informal bypasses.
Draft public-event previews are protected through signed, short-lived preview access rather than being casually exposed on public routes.
Request IDs, runtime error intake, audit scaffolding, and job execution traces are part of the system foundation.
Controls
These sections describe how Eventberry is intended to behave across public launch, internal operators, and sensitive system actions.
Get started
The features, pricing, and legal pages explain how the product works. The security page explains how the architecture is intended to protect and support it.