14,847 out of 15,000
spots are already taken
July 2026
Next round opens
Sign up today
Limited availability

Security

Zeon Grow places the highest priority on the safety of users’ assets and information. We maintain a robust and reliable system architecture supported by strict operational security procedures.

On this page, we provide detailed information about the security measures implemented by our company, as well as guidelines to help users use our services safely.

Secure Account Registration

Software Updates

Regular updates of applications and operating systems (OS) are essential for maintaining strong security. The latest versions typically include fixes for software defects and vulnerabilities, as well as improvements to security features.

Keeping your software up to date helps protect your device and account from potential security threats.

Strong Passwords and Multi-Factor Authentication

In addition to using strong and complex passwords, we strongly recommend enabling multi-factor authentication (MFA).

Multi-factor authentication adds an additional layer of security beyond a password (knowledge factor) by requiring another verification method, such as device ownership (one-time verification codes) or biometric authentication (face recognition or fingerprint).

This significantly reduces the risk of unauthorized access to your account.

Avoid Clicking Suspicious Links

To reduce the risk of phishing attacks or malware (computer virus) infections, users should avoid clicking links contained in emails or SMS messages from unknown or suspicious sources.

Accessing the platform through saved bookmarks or trusted links is a safer alternative.

1. Basic Policy: Security and Reliability

Our company implements security measures based on the following core principles:

Through these measures, we aim to provide a safe and reliable environment for users of the Zeon Grow platform.

2. Multi-Factor Authentication (2FA)

To enhance account security, Zeon Grow strongly recommends enabling Two-Factor Authentication (2FA).

2FA requires not only a password but also a verification code generated by an authentication application (TOTP). This additional security layer significantly reduces the risk of unauthorized account access.

Reasons for Implementation

BenefitDescription
Prevention of Unauthorized AccessAdds an additional layer of protection in case a password is leaked
Enhanced SecurityRequires authentication via a smartphone authentication app during login
Secure Login ExperienceReduces the risk of unauthorized account access or misuse

2.1 What is Two-Factor Authentication (2FA)?

Two-Factor Authentication (2FA) is a security method that requires users to provide two different forms of verification when accessing a protected account or service.

Instead of relying solely on a username and password, 2FA adds an additional layer of security by requiring a second authentication factor. This helps protect accounts from common attacks such as phishing or password leaks.

With 2FA enabled, your identity is verified through two separate steps. Access to the account is granted only when both verification factors are successfully confirmed.

2.2 Authentication Factors

Authentication methods generally fall into three main categories:

Something you know
This includes passwords, PIN codes, or answers to security questions.

Something you have
This includes a mobile device used to generate one-time passwords, a hardware security key, or a smart card.

Something you are
This refers to biometric authentication such as fingerprints, facial recognition, or other biometric identifiers.

By combining authentication factors from different categories, even if one factor becomes compromised, an attacker will still be unable to access the account.

In some cases, platforms may use multi-factor authentication (MFA), which involves more than two verification factors for additional security.

2.3 How 2FA Works

A typical Two-Factor Authentication process works as follows:

  1. The user enters their username and password on the login page.
  2. The system verifies the login credentials.
  3. The user is prompted to enter a second authentication factor, usually a one-time verification code generated by an authentication app.
  4. Once the second factor is verified, access to the account is granted.

This additional verification step significantly improves account security and helps protect users from unauthorized access.

3. Data Encryption

3-1. Encrypted Communication (SSL/TLS)

All communications on our platform are protected using SSL/TLS encrypted connections.

This helps prevent interception or tampering by third parties over the internet.

3-2. Encryption of Stored Data

Sensitive data stored within the system (such as passwords, API keys, and personal information) is protected using strong encryption methods.

Because the data is stored in an encrypted format, a high level of security is maintained even in the unlikely event of a data breach.

4. Account Protection

Zeon Grow enhances account protection through the following multi-layered security measures:

These measures help prevent unauthorized access and account takeovers while protecting user accounts.

5. Fraud Prevention and Detection

Zeon Grow operates an automated monitoring system to help prevent unauthorized use.

The system detects patterns such as:

If suspicious activity is detected:

6. Security Policies and Framework

6-1. Security Policy

Our company maintains the following security policies and continuously improves them:

6-2. Personal Information Protection Policy

Zeon Grow considers the protection of users’ personal information a top priority and manages such information in accordance with its Privacy Policy.

For details regarding how personal information is handled, please refer to:

7. Security Tips for Users

Users can further enhance their account security by following the recommendations below.

7-1. Password Management

7-2. Use of Two-Factor Authentication

7-3. Beware of Phishing Scams

7-4. API Key Permission Settings