Security
Enterprise-grade security,
from day one
Capabilities
Technical security features
Encryption, authentication, audit, and access control โ every security layer covered.
Encryption
In-transit & at-rest encryption
All data is encrypted with TLS 1.2+ in transit and AES-256 at rest.
Privacy
GDPR & CCPA compliance
Compliant with EU GDPR, California CCPA, Korea PIPA, and other major regulations.
Auth
SSO & SAML
SAML 2.0 and OIDC SSO available on the Enterprise plan.
RBAC
Fine-grained access control
RBAC at the organization, app, and feature level for precise team permissions.
Audit
Audit logs
Every user activity and admin action is logged to meet compliance requirements.
No-keys
Cloud-native auth only
AWS AssumeRole + external ID, Azure Service Principal, GCP Workload Identity Federation. Long-lived IAM keys are never stored.
Principles
Our data principles
We protect customer data with operational principles, not just technology.
Minimal data collection
We collect only what analytics needs and anonymize sensitive information by default.
Customer data ownership
You own every byte of your data and can export or delete it anytime.
Transparent data handling
Collected fields, retention periods, and sub-processors are explicit in our privacy policy.
Incident response
We notify affected customers immediately on any security incident and share a post-mortem.