Features Pricing Security Integrations Contact
Book a Demo

SOC 2 Type II

Independently audited controls for security, availability, and confidentiality. Annual re-certification ensures ongoing compliance.

ISO 27001

Certified information security management system (ISMS) with comprehensive policies and procedures.

GDPR Compliant

Full compliance with EU data protection requirements. Data processing agreements available for all customers.

How we protect your data

Data Encryption

  • Encryption at rest All data encrypted with AES-256 encryption
  • Encryption in transit TLS 1.3 for all data transmission
  • Key management Keys managed via Google Cloud KMS
  • Database security Encrypted backups with point-in-time recovery

Access Control

  • Role-based access Granular permissions by role and team
  • SSO integration SAML 2.0 and OIDC support
  • MFA enforcement Require multi-factor authentication
  • Session management Configurable timeout and device limits

Infrastructure

  • Google Cloud Platform Enterprise-grade cloud infrastructure
  • Multi-region deployment Geographic redundancy and failover
  • DDoS protection Cloud Armor and load balancing
  • VPC-capable Separation for your data through VPC usage

Audit & Monitoring

  • Complete audit logs Every action logged and timestamped
  • Real-time monitoring 24/7 security monitoring and alerting
  • Vulnerability scanning Continuous security assessment
  • Penetration testing Annual third-party security audits

Enterprise security features

Additional security controls for organizations with advanced requirements

Single Sign-On (SSO)

Integrate with your identity provider using SAML 2.0 or OIDC. Supports Okta, Azure AD, OneLogin, and more.

SCIM Provisioning

Automatically provision and deprovision users from your directory. Real-time sync with your identity provider.

Data Residency

Choose where your data is stored and processed. Options include US, EU (Frankfurt), and Asia-Pacific (Singapore).

IP Allowlisting

Restrict access to specific IP addresses or ranges. Ensure users can only access from approved networks.

Custom Data Retention

Configure data retention policies to meet your compliance requirements. Automatic purging of old data.

Custom Security Policies

Work with our security team to implement custom policies that meet your specific requirements.

Security resources

Have security questions?

Our security team is ready to answer your questions and provide documentation for your review.