Enterprise Security

Security you can trust

We take data security seriously. Our comprehensive security program protects your data with enterprise-grade controls and industry-leading compliance standards.

Security by Design

Every aspect of our platform is built with security as a fundamental requirement

End-to-End Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.
Least-Privilege Access
Role-based access controls ensure team members only access data necessary for their role.
Comprehensive Audit Logs
Complete audit trail of all data access, modifications, and system activities.
Data Retention Controls
Configurable data retention policies with automatic deletion and compliance reporting.

Compliance Standards

We maintain compliance with major data protection and security frameworks

GDPR
Compliant
Full compliance with European General Data Protection Regulation
CCPA
Compliant
California Consumer Privacy Act compliance for U.S. operations
SOC 2 Type II
In Progress
Security, availability, and confidentiality controls audit
ISO 27001
Planned
Information security management system certification
U.S.-Based Data Hosting
Your data stays within United States borders with optional regional hosting
Primary hosting in US-East (Virginia)
Backup facilities in US-West (Oregon)
No international data transfers
FedRAMP-authorized cloud providers
Physical security controls
24/7 infrastructure monitoring

Subprocessors

Third-party services we use to deliver our platform, all vetted for security and compliance

Service ProviderPurposeLocation
Amazon Web ServicesCloud infrastructure and data hostingUnited States
CloudflareContent delivery and DDoS protectionGlobal
StripePayment processingUnited States
SendGridTransactional email deliveryUnited States

Incident Response

Our structured approach to handling security incidents and protecting your data

1
Detection
Automated monitoring systems detect potential security incidents within minutes
2
Assessment
Security team evaluates the scope and impact of the incident
3
Containment
Immediate steps taken to prevent further damage or data exposure
4
Communication
Affected customers notified within 72 hours as required by regulations
5
Recovery
Systems restored and additional safeguards implemented
6
Review
Post-incident analysis to improve security measures and prevent recurrence

Security Resources

Access our security documentation and compliance materials

Data Processing Agreement
Comprehensive DPA covering data handling, processing, and compliance requirements
Security Whitepaper
Detailed technical documentation of our security architecture and controls

Security Questions?

Our security team is here to answer your questions and provide additional documentation as needed.