Security

Security isn't a feature. It's a foundation.

We know you're trusting us with your team's data. Here's exactly how we protect it.

SOC 2 Type II Certified

Audited annually by independent third party

AES-256
GDPR

SOC 2 Type II certified

Our infrastructure and processes are audited annually by an independent third party. Enterprise customers can request the full SOC 2 report.

Encryption everywhere

All data is encrypted at rest using AES-256 and in transit using TLS 1.3. Database fields containing sensitive information use application-level encryption.

GDPR compliant

Full compliance with GDPR including data minimization, purpose limitation, and right to erasure. EU customers can use our Frankfurt region for data residency.

99.9% uptime SLA

Multi-region deployment across US and EU with automatic failover. Real-time status monitoring at status.mnage.ai.

Incident response

Dedicated security team with <1 hour response time for critical incidents. Transparent incident communication via status page and email.

Backups & recovery

Automated daily backups with 30-day retention. Point-in-time recovery available. Backups are encrypted and stored in a separate region.

Access controls

Role-based access control (RBAC) at the organization, team, and individual level. SSO/SAML available on Enterprise plans.

Audit logging

Comprehensive audit logs for all administrative actions, data access, and configuration changes. Logs retained for 12 months.

Employee security

All employees undergo background checks and security training. Access to production systems requires MFA and is reviewed quarterly.

Vulnerability management

Continuous vulnerability scanning and quarterly penetration testing by third-party security firms. Responsible disclosure program available.

AI & your data

Our AI processes your data to provide Services — never to train models. Here are our commitments:

Your data is never used to train our AI models
AI decisions include confidence scores and can be reviewed by humans
Follow-up messages are generated per-request, not stored as training data
Proof validation uses ephemeral processing — files are analyzed and results stored, not raw inputs
Integration tokens are encrypted with customer-specific keys
AI model outputs are logged for auditability, not for model improvement

Questions about security?

We're happy to walk through our security practices, share our SOC 2 report, or discuss a custom DPA.