Do you want to explore all the possibilities of the system? Start your 30 day free trial now!

Security &Privacy Policy

Security:

We know that you are entrusting the Company with your data. We appreciate your trust and take our responsibility very seriously. That is why the Company adheres to and practices principles that focus on using multiple layers of security controls. Rather than focusing on perimeter defense, the Company also employs security models developed by industry leaders to secure resources at the system level. The Company takes multiple measures to ensure that your data stays locked down at every level.

Among the security measures implemented by the Company to prevent data leaks and unauthorized data access are the following:

  • Strongest industry-standard encryption.
  • Continuous security management and monitoring.
  • Input validation.
  • Frequent vulnerability scans.
  • Web application firewall.
  • Annual third-party penetration test.
  • Annual third-party SOC II security audit.
  • Active bug bounty program.
  • Native Multi-Factor Authentication available to all customers.

Security is more than just creating a secure application. Security involves monitoring, improving, and remaining vigilant against internal and external risks. We understand that.

If you have more questions, then please get in touch with us. The Company can provide additional information, including compliance reports and attestation letters, upon request.

Privacy:

The Company does not share, trade, or sell any customer data! Your information and your company’s information is not for sale, and it never will be. The Company restricts access to customer data to individuals who require that information to fulfill their job duties. All employees of the Company are subject to background checks before hiring to ensure that the individuals hired are of the highest integrity.

Menu