Security & Compliance

Enterprise-Ready from Day One

Built for teams that need security, compliance, and procurement support.

SSO / SAML-ready

Secure authentication for your org

Role-based access control

Exec / PM / engineer / client roles

Audit log

Who changed what, when

Data boundaries

Org + project isolation

Exportable outputs

PDF/CSV board reports

Private onboarding

NDA available, pilot scoped

Procurement & Security (quick answers)

๐Ÿ” SSO / SAML + SCIM

SSO (SAML/OIDC): Roadmap. Currently supports standard login. SSO planned for enterprise rollouts.

SCIM provisioning: Automated user provisioning/deprovisioning is planned.

Note: We can pilot without SSO, then enable SSO for broader rollout.

๐Ÿ‘ฅ RBAC & Project Isolation

Role-based access: Permissions enforced by role. Projects are isolated so users only see what they're invited to.

Common roles: Admin, Project Lead/PM, Member, Client, Guest (read-only or limited access).

๐Ÿ“‹ Audit Logs

Audit trail: We track key administrative and project actions with timestamp and actor.

Export: Audit data can be provided on request during pilots.

๐Ÿ”’ Data Encryption

In transit: All traffic encrypted (HTTPS/TLS 1.2+).

At rest: Encryption supported and can be enabled per deployment.

๐ŸŒ Data Residency & Single-Tenant

Data residency: Default region available today; additional regions on roadmap.

Single-tenant: Dedicated environments available for enterprise deployments.

๐Ÿ” Production Data Access

No access by default: Support and engineering do not access customer data by default.

Break-glass access: If access required to resolve an issue, it's time-bound, approved, and logged.

๐Ÿ›ก๏ธ SOC 2 & Penetration Testing

Security reviews: We follow a security-first SDLC and run routine vulnerability checks.

SOC 2 & Pen test: On the enterprise roadmap.

๐Ÿ“„ Legal: NDA, DPA, MSA

NDA: Mutual NDA available.

MSA: Standard MSA available (or we can review yours).

DPA: DPA available for customers who require it (GDPR-ready where applicable).

Security questionnaire: We typically respond within 5 business days.

We're used to vendor onboarding and can work with your procurement process.

Built for executive confidence

Security-first architecture

Granular permissions, audit trail, data boundaries. Your project data stays yours.

Concierge onboarding

We onboard a limited number of teams at a time to ensure fast, hands-on setup and calibration.

Built by an engineering leader

Tired of fighting headcount battles with guesses instead of data. Built the system executives wished existed.

Transparent methodology

No black box. Exposure = delay days ร— blended burn rate (+ optional downstream costs). Used for prioritizationโ€”not accounting.

Need enterprise support?

Book a briefing to discuss your security requirements, or request our Security & Procurement one-pager.

Book a Briefing

Architecture overview ยท Data handling ยท RBAC roles ยท Break-glass policy