Security & Compliance
Zero-trust architecture built for regulated industries. Your data stays protected at every layer.
Certifications & Standards
SOC 2 Type II
Annual third-party audit of security controls, availability, processing integrity, confidentiality, and privacy.
HIPAA Ready
BAA available. Full support for PHI handling with encryption, access controls, and audit requirements.
GDPR Aligned
Data residency controls, right-to-erasure support, DPA available, and EU hosting options.
Encryption Everywhere
- AES-256 encryption at rest
- TLS 1.3 encryption in transit
- Per-workspace encryption keys
- Customer-managed keys (BYOK) for Enterprise
- Hardware Security Module (HSM) key storage
Access Controls
- Role-based access control (RBAC)
- SAML 2.0 and OIDC single sign-on
- SCIM provisioning and deprovisioning
- Multi-factor authentication
- IP allowlisting
- Session management and forced logout
Immutable Audit Trails
Every interaction is logged with an immutable, tamper-proof audit trail. Enterprise plans include 7-year retention with export capabilities.
Complete Visibility
Who accessed what, when, and from where. Full request/response logging for compliance reporting.
Export & Integration
SIEM integration, CSV/JSON export, and real-time streaming to your security operations center.
Infrastructure Security
- Workspace isolation — no data leakage between tenants
- Network segmentation and micro-segmentation
- Regular penetration testing by third-party firms
- Vulnerability scanning and dependency auditing
- DDoS protection and WAF
- 99.99% uptime SLA (Enterprise)
Need More Details?
Request our SOC 2 report, security whitepaper, or schedule a call with our security team.