Founded in 2019

|
|

Compliances

Compliance Logo

SOC 2

Compliant

Compliance Logo

ISO 27001

Compliant

Compliance Logo

HIPAA

Coming soon

Compliance Logo

GDPR

Coming soon

Trusted by

Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo

Controls

Continuously monitored

Product security

Vulnerability Remediation Process

Centralized Management of Flaw Remediation Processes

Single Sign On

Data security

Identify Validation

Encrypting Data At Rest

Inventory of Infrastructure Assets

Network security

Impact analysis

Limit Network Connections

Transmission Confidentiality

App security

Conspicuous Link To Privacy Notice

Endpoint security

Malicious Code Protection (Anti-Malware)

Disk Encryption

Mobile Device Management

Corporate security

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources

Acceptable Usage Policy

Policy

Code of Business Conduct Policy

Policy

Vendor Management Procedure

Policy

Access Control Procedure

Policy

Media Disposal Policy

Policy

Business Continuity & Disaster Recovery Policy

Policy

Subprocessors

Subprocessor Logo

Microsoft Teams

Collaboration & Productivity

India

Subprocessor Logo

Slack

Collaboration & Productivity

India

Subprocessor Logo

Sendgrid

Customer Service

India

Subprocessor Logo

Invision

Design

India

Subprocessor Logo

Google Analytics

Others

India

Subprocessor Logo

Confluence

Collaboration & Productivity

India