SOC 2 Type II, GDPR-ready, ISO 27001, CCPA. Encrypted everywhere, access controlled, and stored under the laws you operate in. This page is the long version — short version: we treat data the way our enterprise customers' security teams expect.
Every byte of customer data is encrypted on the wire and on disk. Keys are rotated on a fixed schedule, managed in a dedicated key-management service, and never co-located with the data they protect.
SSO, 2FA, role-based permissions, and an audit log for every action — including admin reads. Compliance reviewers can pull a full team activity export on demand.
Okta, Azure AD, Google Workspace, Auth0, and any SAML 2.0 / OIDC provider. SCIM for auto-provisioning.
TOTP, hardware key, or recovery code. Admins can enforce 2FA across the workspace.
Owner, admin, marketer, developer, viewer — or custom permission sets on Scale.
Restrict admin access to office or VPN ranges. Available on Growth and Scale.
Customers (yours or ours) can request a full data export or deletion at any time. We honor every request within 30 days.
Submit a request via the API, dashboard, or DSAR endpoint. Identity verification handled automatically.
Same-day acknowledgementWe gather every record tied to the subject across primary, backup, and search indexes. Audit-logged the whole way.
≤ 30-day SLAExport → encrypted bundle with manifest. Deletion → cryptographic wipe + suppression to prevent re-import.
Signed receiptOur infrastructure runs on hardened, dedicated servers with end-to-end isolation per tenant. Health checks, anomaly detection, and brute-force monitoring run continuously. Status and incidents are published in real time.
Standard documents, available on request after an NDA is in place. Reach out and we'll send everything in a single package.
Architecture, controls, sub-processors, data flows — the one-stop overview most reviewers start with.
RequestMost recent audited report. Sent under NDA — request via the contact form and we'll route it.
RequestGDPR Article 28-aligned DPA, pre-signed. Add your details and counter-sign.
RequestWe answer security questionnaires from real humans, usually within one business day.
Talk to security