We prioritize security and privacy.
Earning and maintaining our customers' trust is our priority, and has continually guided our efforts. Since our inception, we have invested heavily in policies and controls, technical security, and a culture of vigilance.
Compliance and Certifications
We hold ourselves to our own high standards, as well as those established by the industry. Our completion of a SOC 2 Type II audit indicates that our processes, procedures and controls have been formally evaluated and tested by an independent accounting and auditing firm. We are proud of the groundwork we've laid in place well in advance of our product launch, and the recognition of these efforts.
Infrastructure and processes that go above and beyond.
Secure Access Controls
Exclusive Google SSO for user account access, SAML-based SSO, two-factor authentication, and policy-based access for internal controls.
3rd Party Audits
We do regular external audits to validate our internal security process.
Encryption at Rest and Transit
All data is encrypted at application level using AES-256 GCM encryption, and served over secure connections to customers.
We commision independent audits to augment our internal audits on a regular basis.
End-user Auditable Logs
Comprehensive and auditable logs of key activities.
Business Associate Agreements (BAAs) or custom T&Cs as needed.
Security & Compliance Guides
The Best Guide to Managing IT for Distributed Teams
COVID-19 has changed how business works. Read the guide to managing in this new environment.