top of page

Technical Guide

Security

Great Chinese Wall.png
Meta Data.png

Connectors

Encryption

All data that is fetched from your source systems is always encrypted using AES-256.

Ready to use

We provide ready-to-use connector solutions to all source systems that we officially support – even hard ones (e.g. SAP S/4HANA).

DIY

If preferred, you can use your own or 3rd party connectors if they fulfill our requirements regarding security & functionality.

Infrastructure & Hosting

supabase-logo-icon.png

Database

We work with Supabase, a database technology trusted by thousands of developers for building and deploying secure applications.

image.png
SOC 2
image.png
HIPAA
vercel-icon-dark.png

Web Application

Our web application is running on Vercel. This web application provider prioritises security.

image.png
ISO 27001
image.png
DPF
image.png
SOC 2
image.png
HIPAA
image.png
GDPR
image.png
PCI DSS
bottom of page