Trust Center

Trust & Compliance

Transparency in how we protect your data. Explore our certifications, audit reports, and comprehensive security practices that keep your business secure.

Security at a Glance

Key security features and protections built into every layer of our platform.

256-bit AES Encryption

All data encrypted at rest using AES-256 encryption standard

TLS 1.3

All data in transit encrypted with latest TLS 1.3 protocol

Multi-Factor Authentication

MFA enforced for all administrative and user access

Enterprise SSO

SAML 2.0 and OIDC single sign-on integration

Role-Based Access Control

Granular permissions and access control at every level

Complete Audit Trail

Comprehensive logging of all actions for compliance

Certifications & Compliance

We maintain rigorous compliance standards and undergo regular third-party audits to ensure your data is protected according to industry best practices.

SOC 2 Type II

Service Organization Control

Active

Independently audited for security, availability, processing integrity, confidentiality, and privacy. Our SOC 2 Type II report demonstrates our ongoing commitment to protecting your data.

Valid until: December 2025

ISO 27001

Information Security Management

Active

Certified under the international standard for information security management systems (ISMS). This certification validates our systematic approach to managing sensitive company and customer data.

Valid until: March 2026

GDPR

General Data Protection Regulation

Active

Fully compliant with the European Union's data protection regulation. We implement appropriate technical and organizational measures to protect personal data of EU citizens.

CCPA

California Consumer Privacy Act

Active

Compliant with California's consumer privacy law, ensuring transparency in how we collect, use, and share personal information of California residents.

HIPAA

Health Insurance Portability

Active

Business Associate Agreement available for healthcare and life sciences customers who need HIPAA-compliant inventory and manufacturing management.

PCI DSS

Payment Card Industry

Active

Level 1 Service Provider compliant. We maintain the highest level of security standards for handling payment card information and financial data.

Audit Reports

We undergo regular security audits and assessments by independent third-party firms. Request access to our audit reports to review our security posture.

SOC 2 Type II Report 2024

November 2024Compliance

Annual SOC 2 Type II audit conducted by independent third-party auditors covering security, availability, and confidentiality controls.

Request Report

Penetration Test Q4 2024

October 2024Penetration

Comprehensive penetration testing of our web application, APIs, and infrastructure by certified security professionals.

Request Report

Vulnerability Assessment 2024

September 2024Vulnerability

Regular vulnerability scanning and assessment of our systems, including remediation verification for all identified issues.

Request Report

Annual Security Review

August 2024Security

Comprehensive security review covering access controls, encryption practices, incident response procedures, and security policies.

Request Report

Requesting Audit Reports

Access to detailed audit reports requires an NDA. Enterprise customers can request reports through their account manager. For others, please contact our security team.

Security & Compliance Controls

Comprehensive security controls across all aspects of our platform.

Data Protection

End-to-End Encryption

All customer data is encrypted at rest and in transit using industry-standard encryption algorithms.

Data Residency Options

Choose where your data is stored with our multi-region data center options in the US, EU, and APAC.

Automated Backups

Continuous backups with point-in-time recovery, ensuring your data is never lost.

Infrastructure

Google Cloud Platform

Hosted on GCP with enterprise-grade security, DDoS protection, and global CDN.

High Availability

99.9% uptime SLA with automatic failover and redundant systems.

Network Security

Firewalls, intrusion detection, and continuous network monitoring.

Access Control

Identity & Access Management

Centralized access control with SSO, MFA, and detailed permission management.

Session Security

Automatic session timeouts, secure session handling, and device management.

IP Allowlisting

Restrict access to your account from approved IP addresses only.

Monitoring

24/7 Security Monitoring

Round-the-clock security operations center monitoring for threats.

Incident Response

Dedicated security team with documented incident response procedures.

Vulnerability Management

Regular vulnerability scanning and timely patching of all systems.

Have Questions About Our Security?

Our security team is available to discuss your specific requirements, provide additional documentation, or schedule a security review call.