Security & Compliance

Complete technical overview of how we protect your data, manage access, and maintain compliance.

Identity management (IdP)

Full support

LDAP/AD integration

Unlimited connections

SAML, Kerberos, OpenID, OAuth2

All protocols supported

Full audit trail

Unllimited retention

End-to-end encryption
Built-in third-party compatible
Server-side encryption
On your hardware or ours

Device managent

Block & wipe lost devices

Data protection & encryption

Your data is encrypted when stored and when shared. Access is controlled, environments are separated, and ownership is clear — so your information stays confidential, without you having to think about it.

 

Identity & access management

One central identity, secure logins everywhere, and clear roles for every user. From Single Sign-On to multi-factor authentication, access is easy to manage and fully auditable.

 

Infrastructure & hosting

We run our own infrastructure in Amsterdam. That means European jurisdiction, no reliance on US hyperscalers, and full operational control over how your data is stored and protected.

Transparency & accountability

Clear agreements, open documentation, and a straightforward incident response approach. If something happens, you’ll know what it means and what comes next.

 

Are you ready for a demo?

Our team will help you find a solution that best fits with your business needs.