End-to-End Encryption
All data in transit and at rest is encrypted using industry-standard protocols.
- TLS 1.3 for data in transit
- AES-256 for data at rest
- Encrypted backups
Enterprise-grade security and compliance that finance, ops, and legal teams trust.
How we handle, store, and protect your data.
All data in transit and at rest is encrypted using industry-standard protocols.
Data stored in SOC 2 Type II compliant infrastructure with regular security audits.
Clear data retention and deletion policies that comply with GDPR and CCPA.
We never sell your data. Data is only shared with fulfillment partners for orders.
Granular permissions that ensure the right people have access to the right data.
Admin, Manager, Sender, Viewer β four distinct roles with clearly defined permissions.
Control access to billing, analytics, automation rules, and team management.
Each workspace is completely isolated. No cross-workspace data access.
Enterprise SSO support via SAML 2.0 for secure authentication.
Complete visibility into who did what, when, and why.
Every action in the system is logged with user, timestamp, and context.
Audit logs retained for 7 years to meet compliance requirements.
Export audit logs in CSV or JSON format for compliance reporting.
Real-time alerts for suspicious activity or unauthorized access attempts.
Meeting the compliance requirements that matter to enterprise buyers.
Currently undergoing SOC 2 Type II certification. Expected completion Q2 2024.
Full GDPR compliance with data processing agreements and privacy policies.
California Consumer Privacy Act compliance with right to deletion and data portability.
Standard DPAs available for enterprise customers upon request.
Secure payment processing that meets PCI DSS requirements.
Payment processing via Stripe with no card data stored on our servers.
All payments processed through Stripe, trusted by millions of businesses.
Enterprise customers can use invoicing (Net-30/Net-60) to avoid card storage.
How we maintain security at every level of our platform.
Regular third-party security audits and penetration testing.
Rapid response to security vulnerabilities with regular patch cycles.
All employees undergo security training and background checks.
24/7 security monitoring with defined incident response procedures.
Contact our security team for detailed security documentation, DPAs, or compliance questions.