Enterprise-grade security and control
RBAC, encryption, audit logs, and incident response pair with SSO/SAML/OIDC, SCIM, and a SOC 2 path. Data residency and single-tenant VPC options meet procurement expectations.
Security controls
Built for InfoSec reviews with governance across roles, encryption, auditability, and documented incident response.
RBAC & least-privilege
Role-based access keeps marketing, procurement, legal, and finance within scoped permissions across the copilot.
Encryption
Data is encrypted in transit (TLS 1.2+) and at rest with managed keys aligned to enterprise policies.
Audit logs
Immutable logs cover campaign changes, approvals, payouts, and identity events for compliance review.
Incident response
Documented runbooks with 24/7 escalation and customer notification SLAs keep InfoSec requirements satisfied.
Identity & compliance
Enterprise identity support with SSO/SAML/OIDC, SCIM provisioning, a SOC 2 path, and deployment options aligned to procurement and legal teams.
SSO / SAML / OIDC
Single sign-on across SAML and OIDC providers ensures centralized authentication for global teams.
SCIM provisioning
Automate user lifecycle management with SCIM for rapid onboarding and offboarding.
SOC 2 path
SOC 2 Type II roadmap with phases aligned to procurement and InfoSec milestones.
Data residency & VPC
Optional regional data residency and single-tenant VPC deployments keep sensitive campaigns isolated.
Procurement-ready materials
Access the procurement pack with DPA, SLA, security addendum, and subprocessors so legal, procurement, and InfoSec can accelerate onboarding.