Founded in 2022

|
|

Compliances

Compliance Logo

HIPAA

Compliant

Compliance Logo

SOC 2

Compliant

Compliance Logo

ISO 27001

Compliant

Controls

Product security

Production System User Review

Situational Awareness For Incidents

Data security

Identity Validation

Production Databases Access Restriction

Multi-factor Authentication

Network security

Transmission Confidentiality

App security

Conspicuous Link To Privacy Notice

Unauthorized Activities

Endpoint security

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources

Acceptable Usage Policy

Policy

Access Control Policy

Policy

Access Control Procedure

Policy

Asset Management Policy

Policy

Asset Management Procedure

Policy

Business Continuity & Disaster Recovery Policy

Policy

Subprocessors

Subprocessor Logo

ShareFile

ftp

Subprocessor Logo

Office365

IAM providers