Founded in 2025

|
|

Compliances

Compliance Logo

SOC 2

In progress

Controls

Continuously monitored

Product security

Production System User Review

Situational Awareness For Incidents

Data security

Termination of Employment

Production Databases Access Restriction

Multi-factor Authentication

Network security

Transmission Confidentiality

Anomalous Behavior

App security

Conspicuous Link To Privacy Notice

Secure system modification

Unauthorized Activities

Endpoint security

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources

Business Continuity Plan

Policy

Network Security Procedure

Policy

Endpoint Security Policy

Policy

Business Continuity & Disaster Recovery Policy

Policy

Incident Management Policy

Policy

HR Security Policy

Policy