Security and Compliance

We take security seriously. Your data is encrypted, hosted in secure data centers, and we undergo regular security audits.

Infrastructure Security

Data is hosted in ISO 27001 certified data centers, physical safeguards, redundant networking, and 24/7 security staff.

Network Security

Our systems are hosted within a secure virtual private cloud. We perform periodic automated network intrusion tests.

Leading Encryption

Your data is encrypted with AES-256 at rest. All connections are secured using TLS with 256-bit encryption.

Regular Audits and Tests

Systems are tested for vulnerabilities, logs are reviewed for suspicious activity, and we get regular third-party audits.

Granular permissions

Invite users to see just a specific analysis or the entire dashboard. You're in control of who has read/write access.

Personnel Training and Controls

All employees undergo regular security training, background checks, access control, and code reviews.

Single Sign-On

Use your existing SAML SSO provider to manage user access and permissions with multi-factor authentication.

Secure Application Development

We follow perform regular code security scans and subject all code to automated testing.

Audit Trails

All user actions are logged and can be reviewed in the audit trail. You can see who accessed what and when.