Founded in 2020

|
|

Compliances

Compliance Logo

ISO 27001

Compliant

Compliance Logo

SOC 2

Compliant

Compliance Logo

GDPR

Compliant

Compliance Logo

ISO 42001 v2023

Compliant

Compliance Logo

HIPAA

Compliant

Trusted by

Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo

AI Security Posture

Cost model

Hybrid

Human-in-loop

Yes

Training on customer data

No training

Data retention

Contract-based

Powered by

Sprinto AI

Controls

Product security

Centralized Management of Flaw Remediation Processes

Audit Logging

Single Sign On

Data security

Inventory of Infrastructure Assets

Testing for Reliability and Integrity

Physical Security

Network security

Limit Network Connections

Transmission Confidentiality

Anomalous Behavior

App security

Conspicuous Link To Privacy Notice

Secure system modification

Login Sessions

Endpoint security

Endpoint Security Validation

Disk Encryption

Threat Detection

Corporate security

Roles & Responsibilities

Competency Screening

Security & Privacy Awareness

Resources

Information Security Roles and Responsibilities

Policy

Data Protection Policy

Policy

Communications & Network Security Policy

Policy

Disaster Recovery Policy

Policy

Asset Management Policy (udpated)

Policy

Password Policy

Policy

Subprocessors

Subprocessor Logo

Google Workspace

IAM providers

Subprocessor Logo

ConvertAPI

Others

Subprocessor Logo

Sentry

Analytics

Subprocessor Logo

AWS

IT infrastructure

Subprocessor Logo

Truto

Others

United States of America

Subprocessor Logo

OpenAI

AI subprocessor

Artificial Intelligence

FAQ