Is my data secure on

We care deeply about data privacy and security and strive to keep our security practices industry-leading. We follow these practices:

  • Using encryption technologies to protect customer data both at rest and in transit
  • Performing regular vulnerability scans over the system, application, infrastructure source code, dependencies, container images, and network
  • Using intrusion detection systems to prevent and identify potential security attacks from users outside the boundaries of the system
  •  Following the principle of least privilege for employee access to the services.