By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.


Safe, secure & connected

Make adoption a breeze by integrating the sources of information your team knows and trusts. We follow the best in the industry protocols to ensure that the use of data is transparent.

Book a demo

We are enterprise ready

No Ad

Single tenant deployment offers single-tenant deployment on an enterprise's cloud infrastructure. A sub-account for can be created within the enterprise's existing cloud account.

Enterprise admin & user management

The enterprise administrator has the ability to manage users, data, monitoring within the organization, including onboarding and removing users as necessary.

Audit logs

Enterprise administrator has the ability to request logs from our backend for periodic review. This instills assurance that has not accessed the data, and provides transparency.

Multi-factor authentication

We leverage advanced authentication services from leading cloud providers, such as AWS Cognito for AWS and SSO/SAML authentication to our enterprise customers.

Your company’s information remains safe

Network and app architecture

Here’s a visual representation to give you the fastest overview of's service architecture.

Security and privacy architecture


Physical access control and logical access control’s infrastructure is designed to have physical access and logical access controls. uses AWS, a sub-service organization, to manage the physical access to its resources. Logical access control is managed by has implemented three layers of architecture while configuring and aligning their physical infrastructure with AWS:(a) Public Network Layer; (b) Application Layer and (c) Data Layer. Each of these layers are designed in a way that safeguards data security and data privacy.
So, go ahead and Try without worrying about your data!​

Authentication and access control

Signed URLs

When a user clicks on specific documents or images to view the data, returns signed URLs to them after first verifying that the user has access to the content. This signed URL is valid only for a limited duration. receives this URL in their data store and verifies that the URL is from a legitimate user and is tamper-free.

AWS cognito’s user login and password information is stored on AWS’s Cognito Service which is secure and supports compliance with a variety of standards such as SOC2, ISO 27001, etc. For more details visit: ( ).

In addition, every data access request made to is authorized via AWS Cognito. This means that only the authenticated users can view or retrieve their data. Further for enterprise customers, they can integrate their active directory and sign on using SSO/SAML.

Azure user login and password information is stored on Azure AD B2B Service which is secure and supports compliance with a variety of standards such as SOC2, ISO 27001 etc. You can view more details here: ( ). In addition, every data access request made to services is authorized via Azure AD B2B. This means that no one other than the authenticated user can view or retrieve their data. Further, for enterprise customers, they can integrate their active directory and sign on using SSO/SAML.

Integrations with other applications uses OAUTH2.0 authentication standards ( ) to sync applications wherever possible. does not store login credentials and passwords for any applications, instead uses a secure and encrypted database to store the access and refresh tokens. The user has the right to revoke access for to sync with any application at any time. For applications like WhatsApp, requests a two-factor consent from the user which includes an OTP and QR code scan. The resultant session cookies are stored in a secure and encrypted form in's data stores.


AWS KMS encryption

1. AWS KMS - Encryption at rest. This ensures data is stored encrypted in disk. We use AES 256.
2. ACM (AWS Certificate Manager): This Provisions and maintains certificates for TLS for encrypting data in motion.
3. Encryption of customer tokens of different private apps using Postgres pgcrypto module.

Azure encryption

1. Azure Key Vault - Encryption at rest. This ensures data is stored encrypted in the disk. We use AES 256.
2. Azure Key Vault - This for encrypting data in motion. We provide two options to our customers for certificates. The customer can choose between     Digicert/GlobalSign - managed by Azure (or) just provide their own certificate obtained from other Certificate authorities.
3. Encryption of customer tokens of different private apps using Postgres pgcrypto module

Cloud security architecture

We host our application on proven public clouds. This means that as a customer, you will inherit the robust standards of cloud security maintained by our cloud partners. Currently, is hosted on AWS, and is compatible with Azure to host customer data - maintaining the highest and best security practices.

Cloud infrastructure

Public cloud facilities

Public cloud data centers have multiple physical and environmental controls in place in their facilities to protect customer data from theft and loss. Our application is managed in such data centers to take advantage of their security features.

Data security architecture

We have applied the best practices for its security architecture. API Gateway to our application provides a single point to filter attacks and secure authentication via AWS Cognito/Azure AD.


Our customer servers use a cloud-based distributed backup framework to reduce redundancy.

Availability and durability

Our application is designed in a way that it can be hosted by various public cloud data centers across the globe and is not limited to AWS and Azure.

Monitoring and authentication

Availability and durability's customer data requires various levels of approval and authentication before it can be accessed.

Network and application vulnerability scanning regularly scans its front-end application and back-end infrastructure to check for known security threats and vulnerabilities.

Centralized logging stores the logs from its production and corporate environments in a central location. This is monitored and alerts are triggered if a possible security threat is detected.

Reputation, monitoring/threat intelligence

The collected logs and all network activity are checked against commercial threat intelligence feeds for potential risks.

Anomaly detection

Any irregular or unusual activity is flagged and triggers an alarm. An example of this could be an unexpected authentication activity.

Data security encryption

AES encryption uses AES encryption to secure its locally stored data such as sensitive application data, database connection configurations and cached query data.

Secure credential storage and encryption does not have access to user passwords. Usernames and passwords are secured using AWS Cognito or Azure AD(Active Directory) which are cloud-based user account control services.

TLS encryption

Data in transit is encrypted and secured from the user's browser to the application via TLS 1.3. This is the latest version of the TLS protocol and is designed to facilitate data security and privacy for communications over the internet.

Product security

Code development follows a standardized, documented SDLC process to develop its code. The process contains listed guidelines on code testing and review before it can be moved to the production phase. This ensures that all developers are on the same page and the quality of code is maintained.

Peer review and unit testing of code

Peer Review is a software quality assurance activity that helps maintain the level of consistency in the design of the software. reviews every written code before it is committed to the master code of the application. Functional and unit tests are performed using automated tools as part of the quality assurance process.

Routine developer training

Software Developers have regular training on secure coding practices that implements.

TLS encryption

The automated code quality tests that conducts specifically target areas such as injection flaws, input validation and CSRF token usage to ensure that no vulnerabilities are detected in the code.

Regular third-party penetration testing performs regular third-party penetration tests also known as “Pen tests”, against the's application and its hosted environment. This test evaluates the system and identifies both, its strengths and weaknesses.

Single sign-on provides SAML-based single sign-on for users. This has significant advantages over using a username and password. It also offers support for SSO solutions from Google Apps, OneLogin, and SAML.

Responsible disclosure is connected with the security community at large and runs a responsible disclosure program to facilitate security vulnerability reporting.

Due diligence- security of third-party service providers

All third-party service providers associated with go through an annual security review.

Corporate security ensures robust and stringent security protocols for all office spaces and materials containing sensitive information. heavily invests in training and vetting its staff to ensure an organization-wide appreciation of data security.

Personnel and third parties

Security organization has established a dedicated information security function responsible for security and data compliance across the organization. This initiative is led by the Chief Security Officer (CSO).

Policies and procedures

The various security policies and procedures implemented at are strictly adhered to and the security culture and responsibility is communicated clearly to all its employees.

Background checks

A background check is conducted before hiring an employee or signing with contractors.All individuals or vendors associated with are expected to sign confidentiality agreements.

Security awareness education

All new hires have to complete mandatory security training as part of their initial induction and training with Employees receive routine security awareness training to keep up with changes and updates. Measures are taken to confirm employee adherence to company security policies.'s employees are constantly made aware of security best practices through informal and formal communications.

Vendor management

The Vendor Management Program run by ensures that all third parties associated with are compliant with an expected level of security controls.

Risk management maintains a strong Security Risk Management Program. The CSO of chairs the Security Steering Committee periodically.

Incident response

On-call has a Security and Operations team available 24/7 to respond immediately to security alerts and events.

Policies and procedures

In case of a security breach, maintains and adheres to the documented Incident Response Plan.

Incident response training

Training is provided to all employees on Security Incident Response Processes, including the correct communication channels to report or escalate any security incident.