BizOps
Loading Environment
We are regularly audited by independent third parties to ensure the highest security standards.
We don't rely on just one lock. Your data is protected by multiple security layers from physical, network, application, to data level itself.
List of third-party service providers we use to process data. We minimize the number of third parties to reduce risk.
| Provider | Purpose | Location |
|---|---|---|
| Google Cloud Platform | Cloud Infrastructure (Compute & Storage) | Jakarta (asia-southeast2) |
| Amazon Web Services (S3) | Encrypted Backup Storage | Singapore (ap-southeast-1) |
| Cloudflare | WAF, DDoS Protection, CDN | Global (Anycast) |
| Sentry | Error Tracking (No PII Data) | USA |
Access our complete security audit reports (Penetration Test Results & Compliance Certifications) through our dedicated Enterprise client portal.