Trust center

Trust is the foundation of our business. The products we sell are focused on enhancing trust in our customers' applications. As a business, earning and keeping your trust is our highest priority, but we don’t expect you to make a leap of faith. We encourage you to review our core principles and confirm that we meet your security and privacy requirements.

Reliability

Our services are built on best-in-class technologies, and we relentlessly track down possible points of failure. We focus on quality, performance, high availability, integrity, backup, and redundancy. We constantly improve performance and monitor our systems for responsiveness. We use an immutable, containerized infrastructure that can be quickly upgraded and rolled back in case of a problem. And we have SLAs to provide you with peace of mind, too.

Privacy

We are deeply committed to the privacy of our customers and their data (and their customers' data). We believe in the principles of notice, choice, accountability, minimization, and the right to erasure. We collect what we need, minimize what we collect, and keep data only as long as we need to. We cannot read or use much of the data we store in any way. We consistently apply our privacy approach to our website, to data we maintain about our customers, and to our customers' data that we protect.

Security

Security is important and complex, that’s why we sweat the details. We approach everything from a security-first perspective to gain and maintain our customers' trust. We integrate security into our development processes, internal procedures, physical infrastructure, and monitoring, and we use third parties wherever possible to validate and verify that we’re getting things right. That’s why we are SOC 2 certified.

Transparency

Trust starts with transparency. We will be transparent about what we do, why we do it, and how, whenever we can. We’ll be transparent about what information we have, how we protect it, and why we have it. We’ll be transparent about the security models that we use and the assumptions underlying them. And we’ll be as transparent as possible about government requests.