Security First

Your data security is our top priority. Learn about the measures we take to protect your information.

End-to-End Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption.

Multi-Factor Authentication

Protect your account with TOTP-based 2FA or hardware security keys.

SOC 2 Type II Certified

Annual third-party audits ensure we meet the highest security standards.

GDPR Compliant

Full compliance with data protection regulations including GDPR and CCPA.

Compliance & Certifications

We maintain the highest standards of security compliance

SOC 2 Type II

Certified

Annual audits for security, availability, and confidentiality

ISO 27001

In Progress

Information security management system certification

GDPR

Compliant

EU General Data Protection Regulation compliance

CCPA

Compliant

California Consumer Privacy Act compliance

HIPAA

Available

Health Insurance Portability and Accountability Act

Our Security Practices

Comprehensive security measures at every level

Infrastructure Security

  • Multi-region deployment with automatic failover
  • DDoS protection and rate limiting
  • Web Application Firewall (WAF)
  • Regular security patches and updates
  • Isolated network architecture

Data Security

  • Encryption at rest and in transit
  • Regular automated backups
  • Data retention and deletion policies
  • Secure data processing pipelines
  • Anonymous data aggregation

Access Control

  • Role-based access control (RBAC)
  • Single Sign-On (SSO) support
  • API key management and rotation
  • Audit logs for all actions
  • IP allowlisting capabilities

Application Security

  • Regular penetration testing
  • Static and dynamic code analysis
  • Dependency vulnerability scanning
  • Security headers implementation
  • Content Security Policy (CSP)

Security Questions

Common questions about our security practices

Security Bug Bounty Program

Help us improve our security and get rewarded. We offer bounties up to $10,000 for critical vulnerabilities.

Security Resources

Security Whitepaper

Detailed technical overview of our security architecture

Download PDF

Privacy Policy

Learn how we collect, use, and protect your personal data

Read Policy

Terms of Service

Our commitment to you and your responsibilities

Read Terms

Have Security Concerns?

Our security team is available 24/7 to address any security-related questions or concerns.