Security by design
All changes to our platform undergo a series of security checks, including static code analysis, third-party dependency vulnerability checking, and peer review. Containers are checked for vulnerabilities when pushed and daily thereafter.
We have a supplier security management process to make sure that our suppliers meet our requirements for information security
We have incident response processes, which include notification to customers within 72 hours if their information is impacted.
Updated 18 days ago