Org Logo

Founded in 2020

Compliances (1)

Compliance Logo

SOC 2

Compliant

Trusted by (5)

Trusted By Company Logo

Microsoft

Trusted By Company Logo

Salesforce

Trusted By Company Logo

Wazoku

Trusted By Company Logo

Karbon

Trusted By Company Logo

Ideascale

Controls

Continuously monitored

Product security (2)

Vulnerability Remediation Process

Centralized Management of Flaw Remediation Processes

Data security (6)

Termination of Employment

Multi-factor Authentication

Inventory of Infrastructure Assets

Network security (6)

Limit Network Connections

External System Connections

Transmission Confidentiality

App security (4)

Conspicuous Link To Privacy Notice

Input Data Validation

Mandatory Fields

Endpoint security (3)

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security (26)

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources (41)

HR Security Policy

Code of Business Conduct Policy

Access Control Procedure

Subprocessors (5)

Subprocessor Logo

Slack

Collaboration & Productivity

Subprocessor Logo

Github App

Development software

Subprocessor Logo

SendGrid

Development software

Subprocessor Logo

Vercel

IT infrastructure

Subprocessor Logo

HubSpot

Sales