We deploy network and data access security best practices that meet enterprise standards by:
  • Keeping customer data safe using disk and data encryption while at rest and secure protocols while data is in transit.
  • Constantly managing and control identity and user access.
  • Encrypting communications and operation processes.


We conform to global standards by:
  • Using a broad set of international and industry-specific compliance standards, such as ISO 27001, HIPAA, FedRAMP, SOC 1 and SOC 2, as well as country-specific standards like Australia IRAP, UK G-Cloud, and Singapore MTCS.
  • Providing rigorous third-party audits.


You own your data and you are in control of your data.
More information about privacy policies can be found here: