Trusted on:

|

4.98/5

Security built for enterprise

We employ best-in-class security tools and practices to ensure your data is protected at all levels.

AICPA and SOC badge

SOC 2 Type II certified

We’ve achieved this rigorous certification, assuring you of our unwavering commitment to the highest standards of security, availability, and data protection.

Company security

Ensuring organizational integrity with rigorous secruity protocols

Authentication

We maintain strict role-based access control across all our internal and external systems.

External audits

Annual independent audit of policies and procedures, including: Information Security, Third-Party Risk Management, Business Continuity, Incident Response, and End-User Data and Privacy Policy.

Risk assessments

We conduct frequent risk assessments to gain an accurate and thorough understanding of the potential risks to security, availability, and privacy in our products and services.

Vulnerability scans

We leverage trusted third parties to complete network and application vulnerability scans on a regular basis.

Penetration tests

Constant internal vulnerability scans continuously to identify, prioritize, and remediate potential system vulnerabilities.

Infrastructure security

Safeguarding data with rigorous privacy and encryption standards

Privacy

Compliant with all applicable national, regional, and data privacy laws.

Audit logs

We collects audit trails, covering every write operation in the platform.

Data encryption

We encrypt all data, both at rest AESAES-256-GCM) and in transit TLS1.2TLS1.2.

Product security

Authenticate in the way the best suits your company’s needs and priorities

SSO

The industry standard for securely enabling users to access multiple apps with a single set of credentials.

SAML

Adhere to the industry-standard SAML 2.0 protocol to help you authenticate your users using an external identity provider.

JWT

A digital handshake that allows authenticated users in one application to access a second application.

Magic links

Enjoy the convenience of one-click access while maintaining security by eliminating the need for passwords and reducing the risk of credential-based attacks.

RBAC

Built-in roles and permissions for your team members to ensure that access to information is on a need-to-know basis only.

Resilient operations

Availability

Customized white-gloved support for your particular needs, team, and processes

Redundancy

LaunchNotes ensures active-active availability. improving recovery times and providing access to second availability zones.

Monitoring

Adhere to the industry-standard SAML 2.0 protocol to help you authenticate your users using an external identity provider.

Business continuity

We have documented and implemented a business continuity plan that we activate and follow in the event of disruptions.

Product updates

Powered by LaunchNotes