Skip to main contentA Commitment to Security
We understand that ESOP data is highly sensitive. We are committed to protecting your data and your clients’ data with enterprise-grade security and compliance features.
Core Security Features
- Data Encryption: All data is encrypted at rest using AES-256 and in transit using TLS 1.2+.
- Data Isolation: In our multi-tenant cloud environment, each client’s data is logically isolated. For complete isolation, we offer a single-tenant private cloud deployment.
- Regular Security Audits: We conduct regular internal and third-party security audits and penetration tests to identify and address potential vulnerabilities.
- Secure Software Development: We follow a secure software development lifecycle (SSDLC) to ensure that security is built into our platform from the ground up.
Compliance
- SOC 2: Our managed cloud platform is SOC 2 Type II compliant. We can provide our SOC 2 report upon request under an NDA.
- GDPR & CCPA: We are committed to complying with data privacy regulations like GDPR and CCPA.
Enterprise Security Features
- Single Sign-On (SSO): Integrate with your existing identity provider (e.g., Okta, Azure AD, SAML) for secure and convenient authentication.
- Role-Based Access Control (RBAC): We can work with you to define custom roles and permissions for your team members, ensuring that users only have access to the data and features they need.
- Audit Logs: A detailed audit trail of all actions taken within the platform, including user logins, simulation runs, and configuration changes.
- IP Whitelisting: Restrict access to the platform to a list of approved IP addresses.
- Data Residency: For clients with specific data residency requirements, we can deploy the platform in a specific geographic region in our Private Cloud offering, or you can use our On-Premise offering.
Your Responsibilities
Security is a shared responsibility. While we provide a secure platform, you are responsible for:
- Securely Managing API Keys: Treat your API keys like passwords and keep them secure.
- Managing User Access: Ensure that only authorized users have access to the platform and that their permissions are appropriate for their role.
- Securely Configuring Your Systems: If you are using our On-Premise or Private Cloud offerings, you are responsible for securely configuring your underlying infrastructure.
Contact our security team for more detailed information about our security and compliance program.