Security
We implement robust security protocols to safeguard your information's confidentiality, integrity, and availability.
Our Security Protocols
We believe in simple understandable principals, we are centered around trust with our customers


Product Security
- Regular Security Scans
- Ongoing Monitoring
- Encryption: In Transit and at Rest
- Cloud Hosting: AWS and GCP
Access Controls
- Least Privilege Principle
- User Access Reviews
- Restricted Customer Data Access
- Limited Access to Production
Audit & Compliance
- Third-Party Pen testing
- Change Management Policies
- Incident Response Plan
- GDPR, SOC2 II [In Audit]