256-bit AES Encryption
All data encrypted at rest using AES-256 encryption standard
Transparency in how we protect your data. Explore our certifications, audit reports, and comprehensive security practices that keep your business secure.
Key security features and protections built into every layer of our platform.
All data encrypted at rest using AES-256 encryption standard
All data in transit encrypted with latest TLS 1.3 protocol
MFA enforced for all administrative and user access
SAML 2.0 and OIDC single sign-on integration
Granular permissions and access control at every level
Comprehensive logging of all actions for compliance
We maintain rigorous compliance standards and undergo regular third-party audits to ensure your data is protected according to industry best practices.
Service Organization Control
Independently audited for security, availability, processing integrity, confidentiality, and privacy. Our SOC 2 Type II report demonstrates our ongoing commitment to protecting your data.
Valid until: December 2025
Information Security Management
Certified under the international standard for information security management systems (ISMS). This certification validates our systematic approach to managing sensitive company and customer data.
Valid until: March 2026
General Data Protection Regulation
Fully compliant with the European Union's data protection regulation. We implement appropriate technical and organizational measures to protect personal data of EU citizens.
California Consumer Privacy Act
Compliant with California's consumer privacy law, ensuring transparency in how we collect, use, and share personal information of California residents.
Health Insurance Portability
Business Associate Agreement available for healthcare and life sciences customers who need HIPAA-compliant inventory and manufacturing management.
Payment Card Industry
Level 1 Service Provider compliant. We maintain the highest level of security standards for handling payment card information and financial data.
We undergo regular security audits and assessments by independent third-party firms. Request access to our audit reports to review our security posture.
Annual SOC 2 Type II audit conducted by independent third-party auditors covering security, availability, and confidentiality controls.
Request ReportComprehensive penetration testing of our web application, APIs, and infrastructure by certified security professionals.
Request ReportRegular vulnerability scanning and assessment of our systems, including remediation verification for all identified issues.
Request ReportComprehensive security review covering access controls, encryption practices, incident response procedures, and security policies.
Request ReportAccess to detailed audit reports requires an NDA. Enterprise customers can request reports through their account manager. For others, please contact our security team.
Comprehensive security controls across all aspects of our platform.
All customer data is encrypted at rest and in transit using industry-standard encryption algorithms.
Choose where your data is stored with our multi-region data center options in the US, EU, and APAC.
Continuous backups with point-in-time recovery, ensuring your data is never lost.
Hosted on GCP with enterprise-grade security, DDoS protection, and global CDN.
99.9% uptime SLA with automatic failover and redundant systems.
Firewalls, intrusion detection, and continuous network monitoring.
Centralized access control with SSO, MFA, and detailed permission management.
Automatic session timeouts, secure session handling, and device management.
Restrict access to your account from approved IP addresses only.
Round-the-clock security operations center monitoring for threats.
Dedicated security team with documented incident response procedures.
Regular vulnerability scanning and timely patching of all systems.
Our security team is available to discuss your specific requirements, provide additional documentation, or schedule a security review call.