Founded in 2021

|
|

Compliances

Compliance Logo

SOC 2

Certified

Trusted by

Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo

Controls

Continuously monitored

Product security

Production System User Review

Situational Awareness For Incidents

Data security

Identity Validation

Termination of Employment

Production Databases Access Restriction

Network security

Impact analysis

Transmission Confidentiality

Anomalous Behavior

App security

Conspicuous Link To Privacy Notice

Secure system modification

Unauthorized Activities

Endpoint security

Malicious Code Protection (Anti-Malware)

Corporate security

Code of Business Conduct

Roles & Responsibilities

Competency Screening

Resources

Acceptable Usage Policy

Policy

Data Retention Policy

Policy

Incident Management Procedure

Policy

Data Protection Policy

Policy

Business Continuity Plan

Policy

Personal Data Breach Notification Procedure

Policy

Subprocessors

Subprocessor Logo

Sentry

Analytics

Subprocessor Logo

Slack

Collaboration & Productivity

Subprocessor Logo

Sprinto

Security Software

Subprocessor Logo

Intuit-Quickbooks

HRMS

Subprocessor Logo

Roam

Collaboration

Subprocessor Logo

Figma

Design