DX Insights
Privacy Policy Terms and condition
Overview Controls Subprocessors

Compliance

SOC2 TYPE II

SOC2 TYPE II

GDPR

GDPR

ISO 42001:2023

ISO 42001:2023

ISO 27001:2022

ISO 27001:2022

HIPAA

HIPAA

Controls

App Security

  • Code Analysis
  • Secure Development Practices
  • Web Application Firewall
View in Controls

Data Security

  • Access Monitoring
  • Backups
  • Encryption
View in Controls

Access Control

  • Data Access
  • Logging
  • Password Security
View in Controls

Endpoint Security

  • Disk Encryption
  • MDM
  • Threat Detection
View in Controls

Network Security

  • Real time security and events management
  • Zero Trust
View in Controls

Corporate Security

  • Email protection
  • Employee Training
  • Incident Response
View in Controls

Security Grades

  • CryptCheck
  • HSTS Preload List
  • ImmuniWeb
View in Controls

Infrastructure

  • Cloud Infrastructure Provider
  • Anti DDoS
  • Business Continuity and Disaster Recovery
View in Controls

Reports

  • Pen Test Report
  • Architecture Diagram
  • Certifications
View in Controls

Product Security

  • Audit Logging
  • Integrations
  • Security Contact
View in Controls

Subprocessors

View all subprocessors
  • OpenAI •  Commercial vendor,SaaS OpenAI • Commercial vendor,SaaS
  • AWS •  PaaS AWS • PaaS
  • Microsoft •  IaaS Microsoft • IaaS

Also Compliant In

  • DX

    DX

  • DXKulture

    DXKulture

Controls

Overview App Security Data Security Access Control Endpoint Security Network Security Corporate Security Security Grades Infrastructure Reports Product Security

Overview

Our security program covers organizational, technical, and operational controls designed to protect customer and company data. We align with recognized frameworks and continuously improve our posture through assessments, monitoring, and training. The sections on the right summarize how we approach application security, data protection, access, endpoints, networks, corporate practices, third-party signals, infrastructure, reporting, and product-level safeguards.

App Security

How we secure the application lifecycle: scanning, engineering practices, and edge protection.

Code Analysis

Code Analysis is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Secure Development Practices

Secure Development Practices is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Web Application Firewall

Web Application Firewall is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Data Security

Monitoring, redundancy, and encryption for organizational and customer data.

Access Monitoring

Access Monitoring is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Backups

Backups is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Encryption

Encryption is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Access Control

Governance around who accesses data and systems and how activity is audited.

Data Access

Data Access is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Logging

Logging is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Password Security

Password Security is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Endpoint Security

Baseline protection on devices accessing company systems.

Disk Encryption

Disk Encryption is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

MDM

MDM is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Threat Detection

Threat Detection is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Network Security

Segmentation, monitoring, and resilient network architecture.

Real time security and events management

Real time security and events management is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Zero Trust

Zero Trust is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Corporate Security

People-centric controls: phishing defense, readiness, and response.

Email protection

Email protection is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Employee Training

Employee Training is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Incident Response

Incident Response is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Security Grades

External attestations of our public-facing security posture.

CryptCheck

CryptCheck is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

HSTS Preload List

HSTS Preload List is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

ImmuniWeb

ImmuniWeb is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Infrastructure

Cloud posture, denial-of-service protection, and operational continuity.

Cloud Infrastructure Provider

Cloud Infrastructure Provider is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Anti DDoS

Anti DDoS is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Business Continuity and Disaster Recovery

Business Continuity and Disaster Recovery is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Reports

Artifacts we maintain for assurance: testing, diagrams, and certification evidence.

Pen Test Report

Pen Test Report is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Architecture Diagram

Architecture Diagram is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Certifications

Certifications is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Product Security

Capabilities inside the product: audit trails, integrations, and security contact.

Audit Logging

Audit Logging is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Integrations

Integrations is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Security Contact

Security Contact is documented and reviewed as part of our security and compliance program, aligned with applicable standards and internal policies.

Subprocessors

  • OpenAI •  Commercial vendor,SaaS

    OpenAI • Commercial vendor,SaaS

    Corporate Location

    United States

    Nature and Purpose of Processing

    Generative AI services provider for intelligence product features

    Categories of data (including personal)

    Personal data contained in user account information and text or files created by customer and stored in Applicable Cloud Products

    Location of Processing

    United States

  • AWS •  PaaS

    AWS • PaaS

    Corporate Location

    United States

    Nature and Purpose of Processing

    Cloud Infrastructure for our apps and services

    Categories of data (including personal)

    Personal data contained in user account information and text or files created by customer and stored in Applicable Cloud Products

    Location of Processing

    EEA (Sweden, Ireland and Germany), UK, Canada, Australia, Brazil, Singapore, South Korea, USA, India, Japan

  • Microsoft •  IaaS

    Microsoft • IaaS

    Corporate Location

    United States

    Nature and Purpose of Processing

    Cloud hosting provider

    Categories of data (including personal)

    Personal data contained in user account information and text or files created by customer and stored in Applicable Cloud Products

    Location of Processing

    United States, Australia, Netherlands

Powered by DX Insights