Founded in 2023

|
|

Compliances

Compliance Logo

GDPR

Certified

Compliance Logo

SOC 2

Certified

Compliance Logo

ISO 27001 v2022

Certified

Compliance Logo

ISO 27001

Certified

Trusted by

Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo

Controls

Product security

Production System User Review

Vulnerability Remediation Process

Centralized Management of Flaw Remediation Processes

Data security

Termination of Employment

Multi-factor Authentication

Encrypting Data At Rest

Network security

Impact analysis

Limit Network Connections

External System Connections

App security

Conspicuous Link To Privacy Notice

Secure system modification

Unauthorized Activities

Endpoint security

Malicious Code Protection (Anti-Malware)

Endpoint Security Validation

Session Lock

Corporate security

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources

Compliance Procedure

Policy

Endpoint Security Policy

Policy

Encryption Policy

Policy

Network Security Procedure

Policy

Incident Management Policy

Policy

Data Classification Policy

Policy

Subprocessors

Subprocessor Logo

Atlassian(Jira)

Development Documentation

Subprocessor Logo

Github App

Development software

Subprocessor Logo

Mongo Atlas

Datastore Providers

Subprocessor Logo

Pinecone

IT infrastructure

Subprocessor Logo

Stripe

Finance

Subprocessor Logo

Squarespace

Hosting Providers