SECURITY AND PRIVACY

How We Protect Your Data

Infrastructure

Secure, scalable, AWS-based architecture.

Infrastructure

Secure, scalable, AWS-based architecture.

Infrastructure

Secure, scalable, AWS-based architecture.

Data Security

Data is encrypted, stored securely, and segregated.

Data Security

Data is encrypted, stored securely, and segregated.

Data Security

Data is encrypted, stored securely, and segregated.

Access Control

A robust set of in-product data access and admin controls for greater visibility and control over your data.

Access Control

A robust set of in-product data access and admin controls for greater visibility and control over your data.

Access Control

A robust set of in-product data access and admin controls for greater visibility and control over your data.

Governance, Risk, and Compliance

Our information security program, policies, and vendor reviews safeguard customer data.

Governance, Risk, and Compliance

Our information security program, policies, and vendor reviews safeguard customer data.

Governance, Risk, and Compliance

Our information security program, policies, and vendor reviews safeguard customer data.

Secure Infrastructure

Network Security

External traffic is filtered through a Web Application Firewall with role-based security groups.

Network Security

External traffic is filtered through a Web Application Firewall with role-based security groups.

Network Security

External traffic is filtered through a Web Application Firewall with role-based security groups.

Built on AWS

All infrastructure is deployed on AWS using secure configurations and VPCs.

Built on AWS

All infrastructure is deployed on AWS using secure configurations and VPCs.

Built on AWS

All infrastructure is deployed on AWS using secure configurations and VPCs.

Data Center Redundancy

Data is stored in the Oregon (us-west-2) AWS region across multiple availability zones.

Data Center Redundancy

Data is stored in the Oregon (us-west-2) AWS region across multiple availability zones.

Data Center Redundancy

Data is stored in the Oregon (us-west-2) AWS region across multiple availability zones.

Data Security

Encryption and Protection

Data is encrypted in transit using TLS 1.2+ and at rest with server-side encryption in AWS S3 and DynamoDB.

Encryption and Protection

Data is encrypted in transit using TLS 1.2+ and at rest with server-side encryption in AWS S3 and DynamoDB.

Encryption and Protection

Data is encrypted in transit using TLS 1.2+ and at rest with server-side encryption in AWS S3 and DynamoDB.

Single-Tenant Infrastructure

We offer robust single-tenant stacks for enterprise customers, allowing for increased data isolation.

Single-Tenant Infrastructure

We offer robust single-tenant stacks for enterprise customers, allowing for increased data isolation.

Single-Tenant Infrastructure

We offer robust single-tenant stacks for enterprise customers, allowing for increased data isolation.

Logical Segregation

All data in our multi-tenant deployments is logically segregated, and enterprise customers can elect to add organization segregation to their single-tenant deployments.

Logical Segregation

All data in our multi-tenant deployments is logically segregated, and enterprise customers can elect to add organization segregation to their single-tenant deployments.

Logical Segregation

All data in our multi-tenant deployments is logically segregated, and enterprise customers can elect to add organization segregation to their single-tenant deployments.

Access Control

Administrator Access

Administrators can manage user roles, permissions, and access to projects.

Administrator Access

Administrators can manage user roles, permissions, and access to projects.

Administrator Access

Administrators can manage user roles, permissions, and access to projects.

Login Security

We support 2FA, single sign-on (SSO), and domain-based login restrictions for enhanced security.

Login Security

We support 2FA, single sign-on (SSO), and domain-based login restrictions for enhanced security.

Login Security

We support 2FA, single sign-on (SSO), and domain-based login restrictions for enhanced security.

Confidential Information

Access to customer data is restricted to authorized employees following strict confidentiality policies.

Confidential Information

Access to customer data is restricted to authorized employees following strict confidentiality policies.

Confidential Information

Access to customer data is restricted to authorized employees following strict confidentiality policies.

Governance, Risk, and Compliance

Information Security

We maintain a formal program to monitor and enforce security controls and compliance.

Information Security

We maintain a formal program to monitor and enforce security controls and compliance.

Information Security

We maintain a formal program to monitor and enforce security controls and compliance.

Security Policies

We maintain comprehensive policies, including incident response, access control, and data retention.

Security Policies

We maintain comprehensive policies, including incident response, access control, and data retention.

Security Policies

We maintain comprehensive policies, including incident response, access control, and data retention.

Subprocessor Management

Vendors are carefully reviewed and reassessed annually to ensure compliance to security and privacy standards.

Subprocessor Management

Vendors are carefully reviewed and reassessed annually to ensure compliance to security and privacy standards.

Subprocessor Management

Vendors are carefully reviewed and reassessed annually to ensure compliance to security and privacy standards.

Learn more about Security & Privacy

See how Clearly AI transforms compliance and risk management.

See how Clearly AI transforms compliance and risk management.

Explore Our Whitepaper

!-- Start of HubSpot Embed Code -->