Security by design

All changes to our platform undergo a series of security checks, including static code analysis, third-party dependency vulnerability checking, and peer review. Containers are checked for vulnerabilities when pushed and daily thereafter.

We have a supplier security management process to make sure that our suppliers meet our requirements for information security

We have incident response processes, which include notification to customers within 72 hours if their information is impacted.