Trust Center

Security You
Can Verify

Transparency is foundational to trust. Here's how we protect your data, maintain compliance, and ensure operational security.

Compliance & Certifications

SOC 2 Type II

Certified

Annual audit of security, availability, and confidentiality controls

ISO 27001

Certified

Information security management system certification

HIPAA

Compliant

Healthcare data protection compliance

FedRAMP

In Process

Federal cloud security authorization

PCI DSS

Compliant

Payment card industry data security standard

GDPR

Compliant

European data protection regulation

Security Practices

🔐

Data Encryption

AES-256 encryption at rest, TLS 1.3 in transit. Customer data encrypted with unique keys.

🛡️

Access Control

Zero-trust architecture. RBAC with least privilege. MFA required for all access.

📝

Audit Logging

Comprehensive audit trails. Immutable logs retained for 7 years. Real-time monitoring.

⚠️

Incident Response

24/7 security operations. <4 hour response SLA. Customer notification within 24 hours.

🔍

Vulnerability Management

Continuous scanning. Critical patches within 24 hours. Regular third-party pentests.

🔄

Business Continuity

Multi-region redundancy. RPO <1 hour, RTO <4 hours. Annual DR testing.

Request Documentation

Enterprise customers can request SOC 2 reports, penetration test summaries, and additional security documentation under NDA.

Request Access