Founded in 2020

|
|

Compliances

Compliance Logo

HIPAA

Compliant

Compliance Logo

SOC 2

Compliant

Controls

Continuously monitored

Product security

Situational Awareness For Incidents

Data security

Identify Validation

Termination of Employment

Multi-factor Authentication

Network security

Anomalous Behavior

Endpoint security

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security

Code of Business Conduct

Organizational Structure

Roles & Responsibilities

Resources

Acceptable Usage Policy

Policy

Data Classification Policy

Policy

Physical and Environmental Security Procedure

Policy

Communications & Network Security Policy

Policy

Asset Management Procedure

Policy

Compliance Policy

Policy