We know you've entrusted us with valuable data, and we take its security very seriously. Below, we've provided a deep dive into our security practices, protocols and tooling. But we're always available to answer questions on this topic. Just send us a note at [email protected] 🔐 Interested in advanced security settings? Contact sales to learn about our Enterprise plan →

Security practices

The following list was last updated May 22, 2020.

Sub-processors

We work with the following companies and tool systems to store, analyze, and transmit data for our users. They've been carefully vetted for best-in-class security practices.