We take data
security seriously
We take data
security seriously
We take data
security seriously
We take data
security seriously
Our information security policy is designed to meet or exceed industry standards with controls in place to keep information safe
Our information security policy is designed to meet or exceed industry standards with controls in place to keep information safe
Our security principles
Our security principles
Our security principles
Bank-level encryption
All data is encrypted at rest and in transit with bank-level encryption standards like the Advanced Encryption Standard (AES 256) and Transport Layer Security (TLS).
24/7 system monitoring
Our systems and software are monitored around the clock for unauthorized access along with vulnerabilities.
SOC 2 Certified
Our yearly SOC 2 review provides an independent and impartial assessment of our security best practices.
Secure Cloud Infrastructure
Modern cloud technologies like AWS and Temporal Cloud host the Benny API. By using cloud infrastructure we're better able to better protect your data.
Our security principles
Bank-level encryption
All data is encrypted at rest and in transit with bank-level encryption standards like the Advanced Encryption Standard (AES 256) and Transport Layer Security (TLS).
24/7 system monitoring
Our systems and software are monitored around the clock for unauthorized access along with vulnerabilities.
SOC 2 Certified
Our yearly SOC 2 review provides an independent and impartial assessment of our security best practices.
Secure Cloud Infrastructure
Modern cloud technologies like AWS and Temporal Cloud host the Benny API. By using cloud infrastructure we're better able to better protect your data.
Our security principles
Bank-level encryption
All data is encrypted at rest and in transit with bank-level encryption standards like the Advanced Encryption Standard (AES 256) and Transport Layer Security (TLS).
24/7 system monitoring
Our systems and software are monitored around the clock for unauthorized access along with vulnerabilities.
SOC 2 Certified
Our yearly SOC 2 review provides an independent and impartial assessment of our security best practices.
Secure Cloud Infrastructure
Modern cloud technologies like AWS and Temporal Cloud host the Benny API. By using cloud infrastructure we're better able to better protect your data.