Frequently Asked Questions
Find answers to common questions about our security practices, compliance, and data protection.
General Security Questions
We implement multiple layers of security controls including encryption at rest and in transit, access controls, regular security audits, and continuous monitoring. Our security practices are validated by third-party audits and certifications.
We use industry-standard encryption protocols including AES-256 for data at rest and TLS 1.2+ for data in transit. All encryption keys are managed using secure key management services with regular key rotation.
We conduct comprehensive security audits annually, including third-party penetration testing and compliance audits. Additionally, we perform continuous vulnerability scanning and regular internal security assessments.
Compliance Questions
We maintain several compliance certifications including SOC 2 Type II, ISO 27001, and others. Visit our Compliance page for a complete list of current certifications.
Yes, compliance reports and certificates are available to customers and prospects under NDA. Visit our Documents page to request access to specific compliance documentation.
Privacy Questions
Yes, we are fully compliant with GDPR requirements. We provide data processing agreements, implement privacy by design, and support all GDPR-mandated user rights. Learn more on our Privacy page.
You can request deletion of your personal data by contacting our privacy team. We will process your request in accordance with applicable privacy laws, typically within 30 days.
Still Have Questions?
If you couldn't find the answer to your question, our team is here to help.