Security Center

    Class-leading compliance & security

    Well-protected, battle-tested, and fitted with the latest technology. Multiple layers of protection for sensitive information.

    HIPAAFedRAMPPCI DSSFERPASOC 2 Type ISOC 2 Type IIISO 27001GDPRCCPA

    Role-Based Access Control

    Granular permissions ensure users only access the data and features they're authorized to use.

    Audit Logging

    Comprehensive audit trails track every access and change to your data for compliance and accountability.

    Data Encryption

    AES-256 encryption at rest and TLS 1.3 in transit protect your data at every stage of the pipeline.

    SOC 2 Compliant

    Independently audited security controls meeting SOC 2 Type I and Type II standards.

    Regular Penetration Testing

    Third-party security assessments and penetration tests conducted on a regular schedule.

    Data Residency

    Choose where your data is stored and processed to meet regional compliance requirements.