Security
Enterprise-grade security for your revenue data
Your data flows through the most critical systems in your business. We treat security as a foundational requirement, not an afterthought.
SOC 2 Type II
Annual third-party audits verify our security controls meet the highest industry standards for data protection and operational security.
End-to-End Encryption
All data is encrypted in transit using TLS 1.3 and at rest using AES-256. Your credentials never touch our servers in plain text.
Zero Data Retention
We process your data in real-time and don't store it. Data flows through our systems but is never persisted beyond what's needed for sync operations.
Infrastructure Security
Hosted on enterprise-grade cloud infrastructure with network isolation, DDoS protection, and continuous security monitoring.
Compliance Ready
GDPR, CCPA, and HIPAA compliant. We help you meet regulatory requirements and can sign BAAs and DPAs as needed.
Access Controls
Role-based access control, SSO integration, and audit logs ensure only authorized personnel can access integration configurations.
Security Practices
Credential Management
- OAuth 2.0 used wherever supported
- API keys encrypted with customer-specific keys
- Automatic credential rotation capabilities
- No shared credentials between environments
Network Security
- All traffic encrypted with TLS 1.3
- IP allowlisting available for enterprise
- Private network connectivity options
- Web Application Firewall protection
Monitoring & Response
- 24/7 security monitoring and alerting
- Automated threat detection
- Incident response team on-call
- Regular penetration testing
Business Continuity
- Multi-region redundancy
- 99.9% uptime SLA
- Automated failover systems
- Regular disaster recovery testing
Have security questions or need our SOC 2 report?
Contact Security Team