We prioritize security and privacy.
Earning and maintaining our customers' trust is our priority, and has continually guided our efforts. Since our inception, we have invested heavily in policies and controls, technical security, and a culture of vigilance.
Compliance and Certifications
We hold ourselves to our own high standards, as well as those established by the industry. Our completion of a SOC 2 Type II audit indicates that our processes, procedures and controls have been formally evaluated and tested by an independent accounting and auditing firm. We are proud of the groundwork we've laid in place well in advance of our product launch, and the recognition of these efforts.
Infrastructure and processes that go above and beyond.
Secure Access Controls
Exclusive Google SSO for user account access, SAML-based SSO, two-factor authentication, and policy-based access for internal controls.
Encryption at Rest and Transit
All data is encrypted at application level using AES-256 GCM encryption, and served over secure connections to customers.
End-user Auditable Logs
Comprehensive and auditable logs of key activities.
3rd Party Audits
We do regular external audits to validate our internal security process.
We commision independent audits to augment our internal audits on a regular basis.
Business Associate Agreements (BAAs) or custom T&Cs as needed.