We take the safeguarding of your company and employee data seriously.
We work with independent third-party auditors and examiners to perform penetration testing, evaluate our control environment, and test our defenses. Our SOC2 Type 2 report provides a comprehensive overview of our security controls and the tests our auditors perform against them.
To request a copy of the report, please contact us.
Our dedicated security and engineering teams have adopted coding best practices, code design reviews, and controls on sensitive data and cryptographic keys. We also perform risk assessments of our vendors to make sure our entire system and its dependencies work safely.
We protect your data with encryption at rest, logging and audit practices, and mandatory two-factor authentication. Our security system utilizes 24/7 automated monitoring for threats and anomalies.