Founded in 2024

|
|

Compliances

Compliance Logo

SOC 2

Coming soon

Compliance Logo

ISO 27001 v2022

Compliant

Compliance Logo

ISO 27001

Compliant

Controls

Product security

Vulnerability Remediation Process

Centralized Management of Flaw Remediation Processes

Data security

Identity Validation

Termination of Employment

Testing for Reliability and Integrity

Network security

Transmission Confidentiality

Anomalous Behavior

App security

Conspicuous Link To Privacy Notice

Secure system modification

Endpoint security

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources

Acceptable Usage Policy

Policy

Access Control Policy

Policy

Access Control Procedure

Policy

Asset Management Policy

Policy

Asset Management Procedure

Policy

Code of Business Conduct Policy

Policy

Subprocessors

Subprocessor Logo

Google Gemini

Artificial Intelligence

Germany

Subprocessor Logo

Railway

IT infrastructure

Netherlands

Subprocessor Logo

Auth0

Security Software

Germany

Subprocessor Logo

Supabase

IT infrastructure

Subprocessor Logo

LlamaCloud

Artificial Intelligence

Subprocessor Logo

Perplexity

Artificial Intelligence