Your Security & Privacy Are Our Top Priority

Our Vision
continuous innovation and strict compliance with industry standard security standards.
Data Encryption
and Access Control
All customer data follows industry standard encryption protocols, both in transit and at rest.
We have strict access control measures, including role-based access, to ensure only authorized personnel have access to sensitive data.
Zero-Knowledge Architecture
Multi-Factor Authentication (MFA)
No Data Sharing or Selling
Regular Audits and Assessments
We conduct regular audits, vulnerability assessments, and penetration tests to identify and address potential security risks; and we also undergo regular internal risk assessment and mitigation exercises. As part of our commitment to security and compliance, we are actively progressing through SOC 2 audit and implement best-in-class controls.


Regular Audits and Assessments
We conduct regular audits, vulnerability assessments, and penetration tests to identify and address potential security risks; and we also undergo regular internal risk assessment and mitigation exercises. As part of our commitment to security and compliance, we are actively progressing through SOC 2 audit and implement best-in-class controls.