Founded in 2012

|
|

Compliances

Compliance Logo

SOC 2

Compliant

Controls

Continuously monitored

Product security

Situational Awareness For Incidents

Data security

Inventory of Infrastructure Assets

Testing for Reliability and Integrity

Network security

Anomalous Behavior

App security

Conspicuous Link To Privacy Notice

Endpoint security

Full Device or Container-based Encryption

Corporate security

Code of Business Conduct

Security & Privacy Awareness

Automated Reporting

Resources

Media Disposal Policy

Policy

Incident Management Policy

Policy

Data Retention Policy

Policy

Access Control Policy

Policy

Password Policy

Policy

Data Classification Policy

Policy