We Are Obsessed with Security

Want Proof?

We use the most powerful encryption, the most current standards, and two-factor authentication to secure data in transit or at rest. We do not store or access institutional information.

Learn More
  • SOC 2 Type 2 compliant
  • Most secure TLS v1.2 and v1.3 protocols
  • No TLS/SSL versions older than v1.2 are allowed
  • PCIDSS compliant credit card processing
  • Strongest block ciphers available
  • 256-bit Advance Encryption Standard (AES256)
  • Infrastructure subject to regular penetration testing

Enhanced Encryption of Data

All the Right Acronyms

Our compute infrastructure requires TLS v1.2 protocol. Customer data is protected in our storage services which support the highest security standards and compliance certifications.

Learn More
2fa verification

Best In Class Authentication

Globally Recognized

We use Auth0 to handle customer logins, an award winning global provider in authentication services. Through Auth0, we provide services such as multi-factor and biometric authentication.

Learn More

Third-Party Validation

We Let Others Be the Judge

In addition to robust internal security auditing controls, we perform regular third-party security audits to test and verify the integrity of our systems and storage infrastructure.

Learn More