Product Security
Product Security
We pay great attention to enterprise features such as access management and single sign on. We are happy to provide more details about our enterprise features upon request.
Data Security
Data Security
We follow industry best practices for data security. We are happy to provide more details about our data security practices upon request.
Data Privacy
Data Privacy
Privacy of customer data is top of mind. We follow industry best practices and follow all applicable privacy regulations.
Access Control
Access Control
Access is tightly controlled and monitored at our company. We are happy to provide more details about our access control practices upon request.
Infrastructure
Infrastructure
We take great care to work with best-in-class infrastructure providers that provide secure computing and storage. Our SOC 2 report provides more details about our infrastructure.
Endpoint Security
Endpoint Security
We follow industry best practices for endpoint security. We are happy to provide more details about our endpoint security practices upon request.
Incident Response
Incident Response
We have a dedicated around-the-clock team that responds to security incidents. We are happy to provide more details about our incident response practices upon request.
Risk Management
Risk Management
We have a dedicated team that manages security risks. We are happy to provide more details about our risk management practices upon request.
BC/DR
BC/DR
We have a business continuity plan in place to ensure that we can continue to operate in the event of a disaster.
Training
Training
We provide security awareness training to all employees to ensure that they are aware of security best practices.
Continuous Monitoring
Continuous Monitoring
We continuously monitor our systems for security threats and vulnerabilities. We are happy to provide more details about our continuous monitoring practices upon request.


