Security & Privacy

We know your metrics are extremly important to you and your business. Our team works continuosly to ensure that all transactions, connections, and access is kept secure at all times .


Data security

Physical security uses Amazon Web Services (AWS) for our hosting. AWS is an industry leader and provides a highly scalable cloud computing platform with end-to-end security and privacy features built in.

Access to these data centers is strictly controlled and monitored using a number of features such as security guards, fencing, security feeds, intrusion detection technology, and other security measures. Learn more

Learn More

Password and credential storage

All passwords for accounts are filtered from our logs and are one-way encrypted in the database using the bcrypt (salted) hash function. Login information is always sent over HTTPS (see “Communication Security”).

Nobody on the team can view your account password. If you lose your password, you will need to go through our password reset procedure, which will email you a link to choose a new password.

Communications security

All communication between your computer and is encrypted using HTTPS (256-bit TLS). This is the same level of encryption used by banks and financial institutions, and is designed to prevent third parties from seeing sensitive information you are sending to/receiving from

We also use HTTPS when fetching your data from third party services.


Product security

Permissions and authentication for third party services

When you connect to a third-party service through one of our pre-built integrations, we store the credentials that allow us to fetch data from that service. We use these credentials to continuously update your data. We always encrypt credentials for these services before storing them.

Role based access controls

We provide a role-based administration system for user accounts. There are 2 roles: Admin and User; each with different permissions.


Maintaining security

Emeployee access and security employees do not have physical access to our servers in AWS. employees are only granted access to systems and data based on their role in the company or on an as-needed basis.

No customer data is stored on employee laptops, and we enforce full-disk encryption and automatic log out after a fixed period of inactivity.

Report a security vulnerability

We welcome reports from security researchers and experts about possible security vulnerabilities with our service.

Our QA approach

We adhere to industry best practices when developing applications for All changes made to our applications and infrastructure are peer reviewed by a separate member of staff, and the changes are recorded in an audit log.

We have a designated team that keeps our software and its dependencies up to date, eliminating any potential security vulnerabilities. We employ a wide range of monitoring solutions for preventing and eliminating attacks to the site.

Third party pentests

We welcome reports from security researchers and experts about possible security vulnerabilities with our service.


Business continuity

Business continuity program has developed and maintains a process for business continuity throughout the organization. Our Business Continuity Plan addresses the information security requirements needed for the organization's business continuity.

Environmental disruptions

AWS's business continuity management plan ensures resiliency, recoverability and contingency from significant business disruption, such as local or regional events like a natural disaster, fire, power outage, acts of malice, and technical or infrastructure disruption.

Data redundancy and backups

We ensure that all customer account data is regularly backed up. Access to these backups is tightly controlled, and audited.


Your privacy

Environmental disruptions

Your privacy is of paramount importance to us. Our Privacy Policy outlines specific details about how we safeguard information.

Personal data and information

Your personal data and information is completely private and secure on

We have tight security policies and controls when it comes to accessing customers' data. On top of this everyone in the company is aware of their responsibilities with personal data in the context of GDPR. and GDPR

At, we worked hard preparing for EU General Data Protection Regulation (GDPR), to ensure that we fulfil its obligations and maintain transparency about customer messaging and how we use data.