We complete annual, independent third-party audits and put security at the centre of our processes.
Our dedicated security and engineering teams have adopted coding best practices, code design reviews and controls on sensitive data and cryptographic keys. We also perform risk assessments of our vendors to make sure our entire system and its dependencies work safely.
We protect your data with encryption at rest, logging and audit practices and have mandatory two-factor authentication. Our secure system uses 24/7 automated monitoring for threats and anomalies.