Skip to content

Enterprise-grade security and control

RBAC, encryption, audit logs, and incident response pair with SSO/SAML/OIDC, SCIM, and a SOC 2 path. Data residency and single-tenant VPC options meet procurement expectations.

Security controls

Built for InfoSec reviews with governance across roles, encryption, auditability, and documented incident response.

RBAC & least-privilege

Role-based access keeps marketing, procurement, legal, and finance within scoped permissions across the copilot.

Encryption

Data is encrypted in transit (TLS 1.2+) and at rest with managed keys aligned to enterprise policies.

Audit logs

Immutable logs cover campaign changes, approvals, payouts, and identity events for compliance review.

Incident response

Documented runbooks with 24/7 escalation and customer notification SLAs keep InfoSec requirements satisfied.

Identity & compliance

Enterprise identity support with SSO/SAML/OIDC, SCIM provisioning, a SOC 2 path, and deployment options aligned to procurement and legal teams.

SSO / SAML / OIDC

Single sign-on across SAML and OIDC providers ensures centralized authentication for global teams.

SCIM provisioning

Automate user lifecycle management with SCIM for rapid onboarding and offboarding.

SOC 2 path

SOC 2 Type II roadmap with phases aligned to procurement and InfoSec milestones.

Data residency & VPC

Optional regional data residency and single-tenant VPC deployments keep sensitive campaigns isolated.

Procurement-ready materials

Access the procurement pack with DPA, SLA, security addendum, and subprocessors so legal, procurement, and InfoSec can accelerate onboarding.