Data Security

At, we strive to provide better customer data for every team. But that would be impossible without making our software a safe and trustworthy place to store data. That’s why data security is an absolute priority to us. For the sake of transparency, here’s a list of measures we take to keep your data safe and available 24-7.

1. AVAILABILITY strives to maintain an uptime of 99.9%, and we use several services to monitor uptime and site availability. In case of downtime or emergency, our team receives real-time notifications, allowing us to act swiftly. In the rare case that issues do arise, we’ll keep you updated at all times through our status page and in-app notifications. We’ll do everything within our power to resolve the issue as soon as we can.


All traffic to passes through an SSL-encrypted connection, and we only accept traffic through port 443. A report of our SSL configuration can be obtained by simple request. During a first website visit, sends a Strict Transport Security Header (HSTS) to the user agent, ensuring that all future requests will be made via HTTPS. Even if a link to is specified as HTTP. All data stored on’s systems is encrypted at rest. Information stored in our database systems or on our file systems is encrypted using the industry standard AES-256 encryption algorithm. AWS stores and manages data cryptography keys in its redundant and globally distributed Key Management Service. This means that even if an intruder were ever able to access any of the physical storage devices, the data contained therein would still be impossible to decrypt without the keys, rendering the information useless. uses Amazon Web Services (AWS) in Frankfurt, Germany (only!) to store user data. These servers undergo recurring assessment to ensure compliance with the latest industry standards, and continually manages risk. By using AWS as our data center, our infrastructure is accredited by:
* ISO 27001
* SOC 1 and SOC 2/SSAE 16/ISAE 3402 (Previously SAS 70 Type II)
* PCI Level 1
* C5 Operational Security
* ENS High
* IT-Grundschutz
More information about AWS security can be found at

To access, you need to provide a strong password of at least 8 characters. We do not store these user passwords in plain text, we only store one-way encrypted password hashes using open source audited Bcrypt, including a per-user-random-salt. This protects users against rainbow table attacks and encrypted password matching.

We block requests originating from known, vulnerable IP addresses or ranges. Requests that originate from the same IP are throttled and rate-limited to avoid potential misuse. To block Cross-Site Scripting Attacks (XSS), all output is escaped by default in our back-end application before hitting the browser potentially causing XSS attacks. We avoid using returning raw data, as this could potentially cause unwanted data to be sent to the browser. Our application blocks requests that do not originate from our own domain(s), to help reduce the risk of Cross Site Request Forgery (CSRF) attacks; For important actions, we also use CSRF-tokens.

We have permanently a certified security analyst on our payroll who continuously performs penetration attempts to test the security of our application, which helps us spot and eliminate potential weaknesses. Our team uses strong, unique passwords for accounts and has set up Two-Factor Authentication for each device and service they use. All employees are encouraged to use password manager software (LastPass, 1Password, …) to generate and store strong passwords. We also make sure to encrypt local hard drives and enable automatic screen locking. All access to application admin functionalities is restricted to a select group of people.


We introduced strict code reviews for any change to our code base, to ensure development best practices are used across all our code pushes. Since the launch of, we’ve invited everyone to notify us of issues they find in our application, to continuously make our platform more secure and reliable. All vulnerability report submissions are read, handled and responded to in the shortest possible time frame.
Get started with in under one hour

Book a meeting with one of our experts and let’s get you started.

REQUEST Free Trial
Connect Sources
One-click integration with your HubSpot, Salesforce, Stripe, Zendesk, Segment, Intercom, and many more...
* Native connection to your SaaS platform, requires SDK integration.
Analyse Influx
Monitor incoming data and events, and enjoy a 360-holistic view of your customers. See which features, content and interactions are most relevant to achieving your goals.
* No coding required.
Build Intelligence
Start with simple rules on what defines stages, health profiles, buying signals, upsell moments, churn detection and specific segments.
* No coding required.
Sync Destinations
Set up destinations, and map customer intelligence to custom fields, making them actionable throughout your workflows.
* No coding required.
© BV 2021 — All rights reserved.
The names and logos of third party products and companies shown on the website and other promotional materials are the property of their respective owners.