
Security
Security designed for organizations that need control
Built with tenant isolation, role-based access, auditability, and EU data handling in mind.
01
Organization isolation
Each organization operates in its own context, with isolated data, branding, and configuration.
02
Role-Based Access
Role-based access from subscriber to system admin, with support for IP restrictions and auditable impersonation.
03
GDPR support
Built-in support for data access and deletion requests, audit logs, and EU-based data handling.
04
Secure Authentication
SSO, Google sign-in, and email/password via Clerk. Custom OIDC provider for partner integrations.
05
Audit Trail
Important actions are logged so administrators and compliance teams can trace changes over time.
06
Encrypted & Monitored
TLS everywhere. Secure token-based download links. Winston logging with daily rotation for operational visibility.

Security by design
Compliance
GDPREU DataSOC 2TLS 1.3OIDC