Fundamentally, we are a cyber security company
Your safety guides everything we do. We believe in security transparency.
Frameworks and Compliance
The solution provider does not maintain their own data centers, instead they utilize third-party cloud providers. Those providers often do hold additional certifications beyond what the solution provider has. In circumstances where clients use their cloud credentials in this solution, they will use those credentials as directed to provision resources for the client.
Minimum attack vector
With rare, explicitly stated exceptions, our production environments are single-tenant for each customer. This prevents one client from abusing the information they have about their remote access network in order to attempt to attack another client on the same system. It also means any threat is segmented to a per-client minimum attack vector.