Security at a glance
Users
Secure logins using One-time passcodes (OTP)
SSO via Microsoft EntraID
Infrastructure
Secure Cloud based infrastructure
Data stored in multiple availability zones
Point in time data recovery
SOC2 Compliance
Operational Controls
Encryption at rest
99.9% SLA
Secure Software Development Lifecycle
Training
Our internal datasets are not used for external LLM learning models, and we do not use external datasets for internal learning purposes
Application
Vulnerability scanning of core applications and dependencies
Anomaly Detection during development
Client/Server Security validations
Content
Role Based Access Control (RBAC)
Secure sharing via token based links
Enterprise grade Data Management Policy