Security information
for HR Employees.

GDPR Compliance
We comply with GDPR principles and can engage in a data processor agreement if needed.

Available Single Sign-On (SSO)
Leverage your existing identity management solutions and access our applications from Okta, Microsoft Azure AD, Ping Identity or any other SAML 2.0 provider.

Role-Based Access
Limit users’ access to sensitive data based on roles you can define.
Security information
for IT Professionals.

AWS Cloud Provider
Our applications are hosted in the AWS cloud environment which holds certifications for ISO 27001, NIST, SOC-2, HIPPA and many other security standards.

Full Data Encryption
Your data is physically secured in datacenters with state-of-the-art access controls. All data is encrypted in motion using TLS 1.2 and, when at rest, using AES 256.

Continuous Monitoring
Trend Micro Deep Security service provides continuous intrusion detection, anti-virus protection, integrity monitoring and log monitoring.