Security
Overview
Jam's security infrastructure meets enterprise standards with SOC 2 Type II compliance, end-to-end encryption, and robust cloud protection. Your data stays secure while your team stays productive.
Security Certifications
Jam is compliant with SOC 2 Type II with annual audits and quarterly vulnerability assessments.
SOC 2 Type II
✅ Compliant
GDPR
✅ Compliant
HIPPA
Soon
Enterprise Security Features
Available to workspaces on our Enterprise plans.
Custom Data Retention
Control how long Jams stay in your workspace with custom deletion schedules.
Enable Enterprise Security Features
Contact our sales team to upgrade to Enterprise. Work with our team to configure SSO, audit logs, and retention policies. Begin using enhanced security features immediately after setup
Security Monitoring
Request SOC 2 Report
Email [email protected] with your request Include your company information and intended use. Our team will verify your qualifications and provide the report.
Report Security Issues
Email [email protected] with details. Our security team responds as quickly as possible. We'll keep you updated throughout the investigation process
FAQs
Where is my data stored?
All data is stored in Google Cloud Platform's Central US region with Cloudflare providing global CDN services.
How often does Jam perform security testing?
We conduct quarterly vulnerability scans and annual penetration tests as required by SOC 2 Type II compliance.
Does Jam have intrusion detection systems?
Jam uses Cloudflare for attack prevention and Google Cloud Platform (GCP) firewalls for infrastructure protection. Since our network is fully managed by GCP, we don't run separate IDS/IPS systems.
Does Jam have a bug bounty program?
We don't currently offer a bug bounty program, but we welcome security reports at [email protected] and respond promptly to all submissions.
Last updated
Was this helpful?