Founded in 2022

|
|

Compliances

Compliance Logo

SOC 2

Compliant

Compliance Logo

ISO 27001

Compliant

Controls

Continuously monitored

Product security

Production System User Review

Situational Awareness For Incidents

Data security

Termination of Employment

Production Databases Access Restriction

Multi-factor Authentication

Network security

Impact analysis

Limit Network Connections

External System Connections

App security

Conspicuous Link To Privacy Notice

Unauthorized Activities

Endpoint security

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources

Business Continuity Plan

Policy

Data Classification Policy

Policy

Incident Management Policy

Policy

Data Retention Policy

Policy

Code of Business Conduct Policy

Policy

Asset Management Procedure

Policy