Infrastructure security

  • We run on AWS EC2 instances and our servers are located in the US. U.S.-based Amazon Web Services (AWS) facilities include 24/7 on-site security and, camera surveillance.
  • AWS provides end-to-end security and privacy features.

Application security

  • We undertake regular application security scans internally on a quarterly basis and externally annually by a third party.
  • We perform annual third party penetration testing to rigorously test our application's security posture.

Data security

  • Data is encrypted in transit and at rest using AES-256 encryption, and we use the AWS Key Management System (KMS) to manage encryption keys for maximum security.
  • Application data is secured in transit using TLS 1.2 and our application logically separates user data, with access to your data protected by strong authentication and authorization controls.

Our security partner Vanta monitors our security posture and compliance 24/7

Monitoring for 67 controls across:

Product security

Infrastructure Security

Organizational security

Internal Security procedures

Data and privacy

our trust report

Data and privacy

  • Data retention procedures established
  • Privacy compliant procedures established
  • Privacy policy available
  • Privacy policy maintained
  • Data classification policy established

Internal Security procedures

  • Production deployment access restricted
  • Incident response policies established
  • Security policies established and reviewed
  • Incident management procedures followed
  • Development lifecycle established

Organizational security

  • MDM system utilized
  • Password policy enforced
  • Security awareness training implemented
  • Production inventory maintained
  • Asset disposal procedures utilized

Product Security

  • Penetration testing performed
  • Data encryption utilized
  • Data transmission encrypted
  • System activity logged
  • Vulnerability and system monitoring procedures established

Infrastructure Security

  • Intrusion detection system utilized
  • Production database access restricted
  • Production network access restricted
  • Infrastructure performance monitored
  • Access control procedures established