Security is not a feature.
It's the foundation.
We protect your data with defense-in-depth security, industry-leading compliance certifications, and full transparency.
Compliance & certifications
Independently audited and verified by leading standards bodies.
SOC 2 Type II
AICPA
CertifiedISO 27001
ISO
CertifiedISO 27017
ISO
CertifiedISO 27018
ISO
CertifiedGDPR
EU
CompliantHIPAA
HHS
CompliantPCI DSS L1
PCI SSC
CertifiedFedRAMP Moderate
GSA
AuthorizedSecurity practices
Multiple layers of protection at every level of the stack.
Encryption at rest & in transit
All data encrypted with AES-256 at rest and TLS 1.3 in transit. Customer-managed keys (BYOK) supported.
Key Management (KMS)
Hardware-backed HSMs for cryptographic key generation, storage, and rotation.
Network isolation
Private VPCs with configurable firewall rules, micro-segmentation, and zero-trust architecture.
Identity & Access (IAM)
Fine-grained RBAC, SAML/OIDC federation, MFA enforcement, and session management.
Audit logging
Immutable audit logs for all API actions, admin operations, and data access events.
Physical security
Biometric access, 24/7 surveillance, redundant power, and ISO 27001-certified facilities.
Defense-in-depth architecture
Data residency
Choose where your data lives. We never move it without your consent.
United States
US-East (Virginia), US-West (Oregon)
European Union
EU-West (Amsterdam), EU-Central (Frankfurt)
Asia Pacific
AP-Southeast (Singapore), AP-Northeast (Tokyo)
Middle East
ME-South (Bahrain)
South America
SA-East (São Paulo)
Report a vulnerability
We take security seriously. If you discover a vulnerability, please report it through our responsible disclosure program.