Security

Enterprise-grade security for your revenue data

Your data flows through the most critical systems in your business. We treat security as a foundational requirement, not an afterthought.

SOC 2 Type II

Annual third-party audits verify our security controls meet the highest industry standards for data protection and operational security.

End-to-End Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256. Your credentials never touch our servers in plain text.

Zero Data Retention

We process your data in real-time and don't store it. Data flows through our systems but is never persisted beyond what's needed for sync operations.

Infrastructure Security

Hosted on enterprise-grade cloud infrastructure with network isolation, DDoS protection, and continuous security monitoring.

Compliance Ready

GDPR, CCPA, and HIPAA compliant. We help you meet regulatory requirements and can sign BAAs and DPAs as needed.

Access Controls

Role-based access control, SSO integration, and audit logs ensure only authorized personnel can access integration configurations.

Security Practices

Credential Management

  • OAuth 2.0 used wherever supported
  • API keys encrypted with customer-specific keys
  • Automatic credential rotation capabilities
  • No shared credentials between environments

Network Security

  • All traffic encrypted with TLS 1.3
  • IP allowlisting available for enterprise
  • Private network connectivity options
  • Web Application Firewall protection

Monitoring & Response

  • 24/7 security monitoring and alerting
  • Automated threat detection
  • Incident response team on-call
  • Regular penetration testing

Business Continuity

  • Multi-region redundancy
  • 99.9% uptime SLA
  • Automated failover systems
  • Regular disaster recovery testing

Have security questions or need our SOC 2 report?

Contact Security Team