Security

    Security-first by design

    Built for MSP environments where tenants, permissions, and auditability are non-negotiable.

    Compliance

    SOC 2In progress
    GDPRIn progress

    Status updates available on request.

    Multi-tenant by design

    Built for MSPs, with tenant boundaries and secure defaults.

    • Tenant-aware data boundaries
    • Secure defaults per client

    Each client's data stays completely isolated.

    Isolated agents and permissions

    Agents operate with scoped access, per tenant and per workflow.

    • Scoped credentials and execution
    • Per-workflow permission controls

    No agent can access more than it needs.

    Approvals for sensitive actions

    Multi-step approvals for workflows and access requests.

    • Human-in-the-loop gates
    • Approval trails per action

    Critical actions require explicit approval.

    Encryption everywhere

    Data encrypted in transit and at rest.

    • TLS in transit
    • Encryption at rest

    Your data is protected at every layer.

    SSO and SAML

    Support SSO with SAML to fit existing identity policies.

    • SAML/SSO support
    • Centralized access control

    Integrates with your identity provider.

    Audit logs + RBAC

    Detailed audit trails and role-based access for least privilege.

    • Role-based access control
    • Immutable-style audit trails

    Complete visibility into every action.

    Designed for multi-tenant MSP operations

    Least privilege by default

    Approvals on sensitive actions

    Writeback and audit trails

    Compliance roadmap

    SOC 2

    In progress

    We are actively completing our SOC 2 program to formalize controls and auditing.

    • Policies and controls
    • Audit readiness
    • Ongoing monitoring

    GDPR

    In progress

    We are aligning policies and processes to support GDPR requirements.

    • Policies and controls
    • Audit readiness
    • Ongoing monitoring

    Frequently asked questions