Trust center·Subprocessors
Authorized subprocessors.
We believe in full transparency about who processes your data. Below is the current list of third-party service providers.
| Name | Service purpose | Data region |
|---|---|---|
| AWS | Cloud infrastructure (compute, storage, networking) | US-East, US-West |
| Auth0 | Identity and access management | Global |
| Okta | Single sign-on (SSO) | US |
| Datadog | Monitoring and logging | US |
| PagerDuty | Incident response and alerting | US |
| Slack | Internal communications | US |
| GitHub | Source code repository | US |
| Stripe | Payment processing | US |
This list is reviewed regularly and subject to change. Material updates are communicated per our notification policy.
Vendor due diligence
Security compliance
- ·SOC 2 Type II or ISO 27001 certification
- ·Annual third-party penetration tests
- ·Signed data processing agreement (DPA)
Continuous oversight
- ·Annual security review and risk assessment
- ·Continuous performance and uptime monitoring
- ·Incident response integration
Need more detail?
Our security team can walk your team through controls, share documentation under NDA, and answer assessment questionnaires.
