Org Logo

Founded in 2018

Compliances (2)

Compliance Logo

SOC 2

Compliant

Compliance Logo

ISO 27001

Compliant

Controls

Continuously monitored

Product security (2)

Vulnerability Remediation Process

Centralized Management of Flaw Remediation Processes

Data security (5)

Multi-factor Authentication

Encrypting Data At Rest

Inventory of Infrastructure Assets

Network security (8)

Impact analysis

Limit Network Connections

External System Connections

App security (2)

Secure system modification

Approval of Changes

Endpoint security (2)

Malicious Code Protection (Anti-Malware)

Endpoint Security Validation

Corporate security (25)

Code of Business Conduct

Roles & Responsibilities

Competency Screening

Resources (32)

Acceptable Usage Policy

Information Security Policy

Data Classification Policy

Subprocessors (8)

Subprocessor Logo

Airwallex

Finance

Subprocessor Logo

Atlassian

Collaboration & Productivity

Subprocessor Logo

AWS

Germany

IT infrastructure

Subprocessor Logo

Beamer

Product Management Software

Subprocessor Logo

Freshdesk

Customer Service

FAQ (17)