We are committed to ensuring the security, confidentiality, and integrity of our customers’ data. We follow industry best practices to mitigate risks, protect sensitive information, and maintain system reliability. Our security measures are continuously reviewed and improved to uphold trust and compliance.
Compliances (3)
ISO 27001 v2022
Compliant
GDPR
Compliant
SOC 2
Compliant
Controls
Continuously monitored
Product security (4)
Production System User Review
Situational Awareness For Incidents
Vulnerability Remediation Process
Data security (14)
Identity Validation
Termination of Employment
Production Databases Access Restriction
Network security (8)
Impact analysis
Limit Network Connections
External System Connections
App security (7)
Conspicuous Link To Privacy Notice
Secure system modification
Approval of Changes
Endpoint security (5)
Malicious Code Protection (Anti-Malware)
Full Device or Container-based Encryption
Endpoint Security Validation
Corporate security (36)
Code of Business Conduct
Organizational Structure
Roles & Responsibilities
Resources (42)
Asset Management Policy
Asset Management policy outlines guidelines for the classification, protection, and responsible handling of company assets at all stages of their lifecycle.
Endpoint Security Policy
Endpoint Security Policy outlines measures to protect an organization's production systems and critical data from unauthorized access via information systems accessed by internal and external users.
Incident Management Policy
Incident Management policy establishes measures for promptly identifying, reporting, assessing, and responding to information security incidents within the company's scope.