We Are Obsessed with Security
Want Proof?
We use the most powerful encryption, the most current standards, and two-factor authentication to secure data in transit or at rest. We do not store or access institutional information.
Learn More- SOC 2 Type 2 compliant
- Most secure TLS v1.2 and v1.3 protocols
- No TLS/SSL versions older than v1.2 are allowed
- PCIDSS compliant credit card processing
- Strongest block ciphers available
- 256-bit Advance Encryption Standard (AES256)
- Infrastructure subject to regular penetration testing


Enhanced Encryption of Data
All the Right Acronyms
Our compute infrastructure requires TLS v1.2 protocol. Customer data is protected in our storage services which support the highest security standards and compliance certifications.
Learn MoreBest In Class Authentication
Globally Recognized
We use Auth0 to handle customer logins, an award winning global provider in authentication services. Through Auth0, we provide services such as multi-factor and biometric authentication.
Third-Party Validation
We Let Others Be the Judge
In addition to robust internal security auditing controls, we perform regular third-party security audits to test and verify the integrity of our systems and storage infrastructure.
