Security you can trust
Your data security is our top priority. We employ industry-leading practices and undergo rigorous third-party audits to ensure your assets are protected.
Industry-recognized certifications
We maintain compliance with the highest industry standards to give you confidence in our security posture.
SOC 2 Type II
In ProgressAnnual third-party audit of security controls
GDPR
CompliantEU data protection regulation compliance
ISO 27001
In ProgressInformation security management certification
HIPAA
ReadyHealthcare data protection standards
How we protect your data
Multiple layers of security ensure your asset data remains private, secure, and available when you need it.
Data Encryption
All data is encrypted at rest using AES-256 and in transit using TLS 1.3. Your sensitive information is protected at every stage.
- AES-256 encryption at rest
- TLS 1.3 for all data in transit
- Encrypted database backups
- Secure key management
Access Control
Granular role-based access control ensures users only see what they need to see.
- Role-based access control (RBAC)
- Single Sign-On (SSO) support
- Native multi-factor auth (MFA)
- Organization-scoped isolation
Audit Logging
Complete audit trail of all actions for compliance and forensic analysis.
- Comprehensive action logging
- Immutable audit records
- Exportable audit reports
- Real-time activity monitoring
Your data, your control
We believe you should have complete control over your data. Here is how we handle it responsibly.
Data Ownership
You own your data. We are just the custodians. Export all your data anytime in standard formats.
Data Retention
We retain your data only as long as you need it. Upon account termination, data is securely deleted.
Data Location
By default, data is stored in secure data centers. Regional hosting is available for Pro plans.
Zero Trust Architecture
Every request is authenticated and authorized. We never assume trust based on network location.
Security questions
Common questions about our security practices and policies.
How is my data encrypted?
Do you support Single Sign-On (SSO)?
How often do you perform security audits?
Do you have a bug bounty program?
Have security questions?
Our security team is here to help. Whether you need our SOC 2 report or have questions about our security practices.