Current SOC 2 status
Security controls aligned with SOC 2 criteria
Formal certification process in progress
Pilot-first rollouts available for narrow team scopes
Data processing and storage runs in EU regions, with infrastructure in the Netherlands and Germany.
Data is encrypted at rest with AES-256 and protected in transit with TLS 1.3.
We inherit user-level permissions from your connected systems instead of bypassing them.
Incident response procedures, network protections, and role-based database access are part of our baseline.
Security Review Workflow
To reduce legal overhead upfront, we can run a pilot for a specific team or use case. This lets your team validate workflow and controls before broader rollout.
If your security team needs context early, we can share a practical security overview and data handling details before implementation.
Policy references
Current SOC 2 status
Security controls aligned with SOC 2 criteria
Formal certification process in progress
Pilot-first rollouts available for narrow team scopes
Data processing and storage runs in EU regions, with infrastructure in the Netherlands and Germany.
Data is encrypted at rest with AES-256 and protected in transit with TLS 1.3.
We inherit user-level permissions from your connected systems instead of bypassing them.
Incident response procedures, network protections, and role-based database access are part of our baseline.
Security Review Workflow
To reduce legal overhead upfront, we can run a pilot for a specific team or use case. This lets your team validate workflow and controls before broader rollout.
If your security team needs context early, we can share a practical security overview and data handling details before implementation.
Policy references