Our Commitment to Security
Our cutting-edge security measures go beyond mere compliance, ensuring the continued protection and confidentiality of all your data. Privacy resides in our ecosystem guiding each of our efforts to ensure that your data is yours alone.
AICPA SOC-2 Type 1 Compliance
We take your security seriously, and that's why we're proud to be SOC-2 Type 1 compliant. This means an independent third-party has assessed our security controls to ensure they meet the rigorous requirements for managing customer data required by AICPA SOC, giving you the confidence that your data is in safe hands.
GDPR Compliance
At our core, we prioritize your privacy and data protection. We are fully committed to adhering to the General Data Protection Regulation (GDPR), demonstrating our dedication to safeguarding personal data and respecting user rights across the European Union.
-
Continuous Automated Attack Surface Monitoring
We employ cutting-edge technology to continuously monitor and protect our system. Our automated tools scan for vulnerabilities, ensuring that we stay one step ahead of potential threats, so you can use our services with peace of mind.
-
State of the Art Data Encryption
We utilize state-of-the-art encryption techniques to safeguard your information, ensuring it remains confidential and secure during transit and at rest.
-
Secure Infrastructure on AWS
We leverage the robust and secure infrastructure of Amazon Web Services (AWS) to host our platform. AWS is trusted by organizations worldwide for its stringent security measures and reliability.
-
Rigorous Access Control and Single Sign-On (SSO)
Your data is only accessible by authorized personnel. We enforce strict access controls and employ Single Sign-On (SSO) for a seamless, yet highly secure login experience, minimizing the risk of unauthorized access.
-
Penetration tested
We subject our systems to regular penetration testing, conducted by experts in the field. This ensures that we proactively identify and address potential vulnerabilities, making our platform even more resilient against external threats.
-
Data Redundancy and Resiliency
Your data is precious, and we treat it as such. We implement data redundancy and resiliency measures, so even in the rare event of hardware failures or unforeseen disruptions, your information remains available and intact.
-
Server Security and Monitoring
Our servers are fortified with the latest security protocols. They're continuously monitored to detect and respond to any suspicious activities, ensuring the highest level of server security to protect your valuable data.