Skip to main content

Built on a foundation of trust

Our end-to-end security solutions are compliant with global government regulations and built on a trusted, cybersecure platform — all designed to help you focus on what matters most.

FIPS 140 – 2 Support

The Federal Information Processing Standard Publication 140 – 2 specifies the security requirements that will be satisfied by a cryptographic module.

SAFETY Act Designation

The SAFETY Act provides important legal liability protections for providers of Qualified Anti-Terrorism Technologies, whether they are products or services.

NDAA Compliant

The National Defense Authorization Act (NDAA) restricts the use, procurement, or sale of certain brands of surveillance equipment for federal agencies.

GDPR Compliant

The General Data Protection Regulation (GDPR) requires businesses to safeguard personal identifiable information and privacy of EU citizens for transactions that occur within EU member countries.

SOC2 Type II Certified

The System and Organization Controls (SOC) is a set of security controls created by The American Institute of Certified Public Accountants (AICPA). Our cloud services have achieved SOC 2 Type 1 and Type 2 compliance, ensuring that customer data is protected at all times.

ISO 27001 Certified

ISO 27001 certification provides a framework and guidelines for establishing, implementing and managing an information security management system (ISMS) to protect the business and customers data.


The California Privacy Rights Act (CPRA) is built upon the existing California Consumer Privacy Act (CCPA) that regulates how California residents’ personal information is handled, processed and stored; including deleting of personal information and the ​“right to forget.”


The PCI DSS provides a set of security standards for the payment card industry (PCI) to help ensure the security of credit card transactions.

Have questions? We can help

Our video security experts can help you implement the right security system for your business.