Security at a Glance
Secure data practices
No training on your data
SOC 2 Type II
Controls independently assessed for effectiveness over time
HIPAA compliant & independently audited
Ongoing independent audits for added assurance over time
End-to-End Encryption
Data protected in transit and at rest
Audited & tested
Logging and monitoring to support traceability









