part of our code.
Software that works perfectly is software that’s secured properly. So, from start to finish, product to practices, we build the strongest possible security and controls into everything we do.
Explore how or get in touch to learn more.
Compliance & certifications
We adhere to industry best practices, and partner with top security organizations to meet their strict compliance standards, and our own.
Product security & compliance features
From where it’s deployed to how it’s accessed (and by whom), our platform is designed with your security needs in mind.
Security controls & data protection
Keeping your data and that of your customers secure and private is our top priority, mainly because it’s yours, too.
Application security & secure development controls
Security starts in the requirements and design phase. That’s were our security architects help analyze potential attack vectors using threat modelling techniques before the actual implementation starts.
Internal and external penetration testing
We have an internal team of certified penetration testers who regularly test new and existing features. Extensive external application security penetration tests with independent security firms are performed annually.
Vulnerability scanning is performed regularly using static code analysis, dynamic runtime scans, network scans, third party component scans, and cloud security posture scans.
Bug bounty on Hacker One
We run a private bug bounty program on the Hacker One platform.