Security & Compliance
Enterprise-grade security. Built in from day one.
Infrastructure Security
- Hosted on AWS infrastructure
- VPC isolation and private networking
- Multi-region data redundancy
- 24/7 infrastructure monitoring
Data Protection
- AES-256 encryption at rest
- TLS 1.3 encryption in transit
- Zero data retention policy
- Automatic data purging
Access Control
- Single Sign-On (SSO) support
- Multi-factor authentication
- Role-based access control
- Comprehensive audit logging
Compliance Roadmap
- SOC 2 Type II (in progress)
- Designed for GDPR compliance
- Designed for CCPA compliance
- Regular third-party security audits
Security-First Architecture
We handle sensitive M&A data. We build security into every layer of our platform. Our infrastructure meets the rigorous requirements of SOC 2 Type II certification.
We never train on your documents. Your data stays yours. Purged automatically after processing.
Report a Security Issue
We take security seriously. If you discover a vulnerability or have a security concern, please let us know.