We Treat Your Data Like Our Data
Secure Infrastructure
Our platform operates on a robust, secure infrastructure designed with redundant systems and advanced firewall protection to ensure uninterrupted service and data integrity.
Multitenancy
Our multitenant architecture securely segregates data and resources, providing each client with a dedicated environment while maintaining efficiency and scalability across our platform.
Privacy & Encryption
We uphold strict privacy standards by employing industry-leading encryption techniques to safeguard sensitive data both in transit and at rest, ensuring confidentiality and compliance with data protection regulations.
Secure Development
We prioritize secure development practices, conducting regular code reviews and implementing stringent testing protocols to mitigate vulnerabilities and deliver resilient software solutions.
24/7 Monitoring
With continuous 24/7 monitoring, we promptly detect and respond to any potential security threats or anomalies, ensuring the highest level of uptime and protection for our users' data.
Network Access Control
Through rigorous network access control measures, including role-based access controls (RBAC) and comprehensive authentication protocols, we enforce strict security policies to prevent unauthorized access and protect our infrastructure from potential threats.
ISO 27001 Certified
Our commitment to data security is reflected in our ISO 27001 certification, demonstrating that we adhere to international standards for information security management. This certification ensures that our systems and processes meet rigorous criteria for protecting sensitive information. Contact us for more information.
AICPA Vendor Certified
In 2014, the American Institute of Certified Public Accountants (AICPA) Assurance Services Executive Committee (ASEC) released the revised version of the Trust Services Principles and Criteria (TSP). SOC (Service Organization Controls) is an audit framework for non-privacy principles that include security, availability, processing integrity, and confidentiality. Our hosting provider, AWS, has both SOC 2 and SOC 3 reports. The SOC 3 report is available for download without a nondisclosure agreement. The SOC 3 confirms compliance with the principles of security, availability, processing integrity and confidentiality.
GDPR Compliant
On May 25, 2018, a new landmark data protection law called the General Data Protection Regulation (GDPR) came into effect. The GDPR unifies data protection rules across the EU and creates new obligations on the protection and handling of personal data, including security requirements and stronger rights for individuals with regard to their personal data. We are committed to complying with the GDPR and supporting our partners and customers in their efforts to comply with the GDPR.
EU-US DPF Compliant
Adherence to the EU US Privacy Shield Framework demonstrates our commitment to protecting the privacy and data of individuals across borders. This certification signifies that we meet the stringent privacy principles required for the lawful transfer of personal data from the EU to the United States.
You’re in good hands
Some people fear the cloud is risky, with hackers grabbing data day and night. To the uninformed, it seems obvious that keeping data safe requires it be kept in a self-controlled environment. To some that means on-site and away from the cloud. But is there any truth to this idea? Not much, really.
While it's theoretically possible to hack into the cloud, data stored in on-site servers is exposed to the same risks as data stored in the cloud. The simple truth is that the cloud has proven itself to be a reliable and secure choice for even the largest businesses, with more than half of enterprise companies noting that cloud infrastructure is a more secure data solution than legacy systems. Learn more in our Security Overview.