Security is at the core of everything we do

SOC 2 Type 2 Compliance
Our security controls are audited by a third-party to ensure that they meet the highest standards.
Penetration testing
We use an external security firm to perform regular penetration tests to ensure that our systems are secure.
Data encryption
We encrypt all data in transit and at rest using industry-standard encryption algorithms.
AI safety
You are in control of your data. It will never be used to train an AI model, and you can delete it at any time.
SOC 2 Type 2 Compliance