Security Frameworks and Certifications
Enterprise-grade security and compliance standards that protect your data and meet regulatory requirements.
SOC2 Type II
Annual independent audit of security and availability controls
Last Audit
July 2024
Next Audit
July 2025
ISO 27001
Information Security Management System international standard
Last Audit
September 2024
Next Audit
September 2027
GDPR Compliance
European Union General Data Protection Regulation adherence
Last Audit
Ongoing
Next Audit
Continuous
NIS2 Directive
EU Network and Information Security Directive compliance
Last Audit
October 2024
Next Audit
Annual review
Technical Security Measures
Comprehensive security controls protecting your data at every layer.
Data Encryption
- βAES-256 encryption for data at rest
- βTLS 1.3 encryption for data in transit
- βEnd-to-end encryption for sensitive communications
- βHardware Security Modules (HSMs) for key management
- βRegular key rotation and cryptographic security reviews
Access Controls
- βMulti-factor authentication (MFA) required for all accounts
- βRole-based access control (RBAC) with least privilege principle
- βSingle Sign-On (SSO) integration with Azure Active Directory
- βRegular access reviews and automated deprovisioning
- βPrivileged access management (PAM) for administrative functions
Infrastructure Security
- βSecure cloud infrastructure with Microsoft Azure
- βNetwork segmentation and micro-segmentation
- βWeb Application Firewall (WAF) and DDoS protection
- βIntrusion detection and prevention systems (IDS/IPS)
- βContinuous vulnerability scanning and patch management
Monitoring & Response
- β24/7 security operations center (SOC) monitoring
- βSecurity Information and Event Management (SIEM)
- βAutomated threat detection and response
- βRegular penetration testing and security assessments
- βIncident response team with defined escalation procedures
Audit Trail and Documentation
Complete audit trail and compliance documentation available for enterprise customers.
Data Residency and International Compliance
Transparent data processing locations and cross-border transfer safeguards for global enterprise customers.
European Union
Amsterdam, Netherlands
Primary data processing location for EU/EEA customers with full GDPR compliance.
United Kingdom
London, United Kingdom
Dedicated UK data processing for post-Brexit compliance requirements.
Norway
Oslo, Norway
Local data processing for Norwegian customers with Datatilsynet compliance.
United States
Virginia, United States
US data processing with state privacy law compliance and federal security standards.
International Data Transfer Safeguards
Legal mechanisms ensuring adequate protection for cross-border data transfers.
Standard Contractual Clauses (SCCs)
European Commission approved clauses for international transfers
Coverage:
Adequacy Decisions
EU Commission recognition of equivalent data protection
Coverage:
Binding Corporate Rules (BCRs)
Internal data protection rules for multinational groups
Coverage:
Certification Schemes
Industry certification programs for data protection
Coverage:
Data Sovereignty and Government Access
Transparency about government access requests and data sovereignty measures.
Data Sovereignty
Customer data remains under the jurisdiction of the chosen processing location.
Government Access Transparency
Annual transparency reporting on government data requests and legal processes.
Legal Protection
Strong legal frameworks protecting customer data from unauthorized access.
Data Residency Support
Contact our compliance team for specific data residency requirements and regional compliance questions.
Enterprise Compliance Support
Get direct access to our compliance team for vendor risk assessments, audit support, and regulatory inquiries.
Compliance Team
General compliance questions, vendor risk assessments, and documentation requests.
Response within 24 hours
Data Protection Officer
GDPR compliance, data subject rights, and privacy impact assessments.
Response within 48 hours
Legal Team
Contract negotiations, legal compliance, and regulatory interpretation.
Response within 72 hours
Security Team
Security architecture, incident response, and technical security questions.
Response within 12 hours
Compliance Inquiry Form
Submit a detailed inquiry and we'll route it to the appropriate team member.
Response Time Commitments
Our compliance team is committed to timely responses based on inquiry type and urgency.
Security Incidents
Within 2 hoursCritical security matters requiring immediate attention
24/7 on-call security team
Vendor Assessments
Within 24 hoursSecurity questionnaires and vendor risk evaluation
Business hours (9 AM - 6 PM CET)
GDPR Inquiries
Within 48 hoursData protection and privacy compliance questions
Business hours with DPO availability
General Compliance
Within 72 hoursDocumentation requests and general compliance questions
Standard business hours response
Escalation Process
If you need to escalate a compliance matter or are not satisfied with the initial response:
Primary Contact
Start with the appropriate team contact based on your inquiry type.
Team Lead Escalation
If not resolved within SLA, your inquiry is automatically escalated to team leads.
Executive Escalation
Critical matters can be escalated directly to our Chief Compliance Officer.
Executive Escalation
For critical compliance matters requiring executive attention.