Founded in 2020

|
|

Compliances

Compliance Logo

SOC 2

Compliant

Compliance Logo

ISO 27001

Compliant

Compliance Logo

GDPR

Compliant

Controls

Data security

Identify Validation

Termination of Employment

Multi-factor Authentication

Network security

Impact analysis

Limit Network Connections

External System Connections

App security

Conspicuous Link To Privacy Notice

Approval of Changes

Endpoint security

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security

Code of Business Conduct

Organizational Structure

Roles & Responsibilities