Enterprise Security

Security You Can Trust

Enterprise-grade security protecting your data and your customers. Built with compliance at the core - so you can focus on closing deals, not worrying about security.

SOC2 In Progress
Compliance Tools
HTTPS Secured
Security Standards

Certifications & Encryption

We invest heavily in security infrastructure and compliance to protect your business data.

SOC2 Type II

In Progress

We are actively pursuing SOC2 Type II certification to demonstrate our commitment to security, availability, and confidentiality standards.

Data Encryption

Via Provider

Customer data is encrypted using industry-standard encryption. Our infrastructure provider (Supabase/AWS) handles encryption at rest.

HTTPS/TLS

Active

All connections to our platform use HTTPS with modern TLS encryption to protect data during transmission.

ISO 27001

Roadmap

ISO 27001 certification is on our security roadmap as we continue to mature our information security management practices.

Regulatory Compliance

Built for Compliance

Stay compliant with industry regulations without lifting a finger. Our platform handles the complexity so you can focus on sales.

TCPA Awareness

Our platform includes features designed to help you maintain TCPA compliance. You are responsible for ensuring your usage complies with applicable laws.

  • Configurable quiet hours settings
  • Do Not Contact list management
  • Consent tracking capabilities
  • Communication frequency controls

Privacy-Focused Design

We design our platform with data protection principles in mind to help you meet your privacy obligations.

  • Data export capabilities
  • Data deletion workflows
  • Consent management tools
  • Audit logging

Privacy Controls

Tools to help you respond to data subject requests and manage privacy preferences for your contacts.

  • Contact data management
  • Opt-out processing
  • Data access requests
  • Privacy preference tracking

Suppression Lists

Manage internal Do Not Contact lists to prevent unwanted outreach. Integration with external DNC registries is your responsibility.

  • Internal suppression list management
  • Email opt-out handling
  • Bulk list upload/export
  • Automatic suppression on unsubscribe
Infrastructure

Enterprise Infrastructure

We build on trusted cloud providers to deliver a reliable and secure platform.

Cloud-Native Architecture

Built on Supabase, which runs on AWS infrastructure with scalability built in.

Managed Infrastructure

We use Supabase's managed infrastructure, which handles availability and redundancy.

Encrypted Databases

Data encryption is provided by Supabase/AWS. Refer to their documentation for specifics.

Backups via Provider

Backups are managed by Supabase as part of their platform. Contact us for retention details.

High Availability

Uptime and reliability are managed by our infrastructure providers (Supabase, Vercel).

Network Security

Network-level protections are provided by our infrastructure providers.

Data Location

Where your data is hosted

🌐Primary Region
Supabase-managed (AWS)

Infrastructure Monitoring

Our infrastructure providers (Supabase, Vercel) offer monitoring and incident response. Contact us for questions about our specific monitoring practices.

Data Handling

Your Data Questions Answered

Transparency is core to how we operate. Here are the answers to common questions about how we handle your data.

Documentation

Security Documentation

Access our security documentation for your compliance and procurement needs.

Security Overview

Request an overview of our security practices and architecture for your evaluation.

Request Info

SOC2 Report

Our SOC2 certification is in progress. Contact us for status updates and timeline.

Inquire

Data Processing Agreement

Request our standard DPA for customers requiring contractual data protection terms.

Request DPA

Need a custom security questionnaire or additional documentation? Contact our security team

Questions About Security?

Our security team is here to help with compliance questionnaires, security assessments, and any questions about how we protect your data.

We typically respond to security inquiries within 24 hours.