www.aikido.dev Open in urlscan Pro
52.17.119.105  Public Scan

Submitted URL: http://aikido.dev/
Effective URL: https://www.aikido.dev/
Submission: On December 23 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

Name: wf-form-Footer-Subscribe-FormGET

<form id="wf-form-Footer-Subscribe-Form" name="wf-form-Footer-Subscribe-Form" data-name="Footer Subscribe Form" method="get" class="footer_form" data-wf-flow="65549fe3a2b6660822c4af19" data-wf-page-id="65549fe3a2b6660822c4af0f"
  data-wf-element-id="1efdf5cf-93cd-ebdc-a93d-e851b05b938b" aria-label="Footer Subscribe Form" data-cb-wrapper="true" data-hs-cf-bound="true"><input type="text" class="form-input is-footer w-input" maxlength="256" name="Email" data-name="Email"
    placeholder="Email ..." email-input="" id="Email" required=""><input type="submit" value="Subscribe" data-wait="Please wait..." id="w-node-b28807f3-fd24-2303-6c70-34f6b4020983-b05b9355" class="button is-secondary is-submit w-button">
  <div email-error="" id="w-node-_52e90bc7-b916-2fd7-506a-b02f17a61d32-b05b9355" class="error-message" style="display: none;">Not quite there yet.</div>
</form>

Text Content

We value your privacy

We use cookies to enhance your browsing experience, serve personalized ads or
content, and analyze our traffic. By clicking "Accept All", you consent to our
use of cookies.

Customize Reject All Accept All
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions.
You will find detailed information about all cookies under each consent category
below.

The cookies that are categorized as "Necessary" are stored on your browser as
they are essential for enabling the basic functionalities of the site. ... Show
more

NecessaryAlways Active

Necessary cookies are required to enable the basic features of this site, such
as providing secure log-in or adjusting your consent preferences. These cookies
do not store any personally identifiable data.

 * Cookie
   _GRECAPTCHA
 * Duration
   5 months 27 days
 * Description
   This cookie is set by the Google recaptcha service to identify bots to
   protect the website against malicious spam attacks.

 * Cookie
   cookieyes-consent
 * Duration
   1 year
 * Description
   CookieYes sets this cookie to remember users' consent preferences so that
   their preferences are respected on subsequent visits to this site. It does
   not collect or store any personal information about the site visitors.

 * Cookie
   __hssrc
 * Duration
   session
 * Description
   This cookie is set by Hubspot whenever it changes the session cookie. The
   __hssrc cookie set to 1 indicates that the user has restarted the browser,
   and if the cookie does not exist, it is assumed to be a new session.

 * Cookie
   __hssc
 * Duration
   30 minutes
 * Description
   HubSpot sets this cookie to keep track of sessions and to determine if
   HubSpot should increment the session number and timestamps in the __hstc
   cookie.

Functional


Functional cookies help perform certain functionalities like sharing the content
of the website on social media platforms, collecting feedback, and other
third-party features.

 * Cookie
   locale
 * Duration
   session
 * Description
   Facebook sets this cookie to enhance the user's browsing experience on the
   website, and to provide the user with relevant advertising while using
   Facebook’s social media platforms.

 * Cookie
   __cf_bm
 * Duration
   30 minutes
 * Description
   Cloudflare set the cookie to support Cloudflare Bot Management.

Analytics


Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics such as the number of
visitors, bounce rate, traffic source, etc.

 * Cookie
   _ga
 * Duration
   1 year 1 month 4 days
 * Description
   The _ga cookie, installed by Google Analytics, calculates visitor, session
   and campaign data and also keeps track of site usage for the site's analytics
   report. The cookie stores information anonymously and assigns a randomly
   generated number to recognize unique visitors.

 * Cookie
   CLID
 * Duration
   1 year
 * Description
   Microsoft Clarity set this cookie to store information about how visitors
   interact with the website. The cookie helps to provide an analysis report.
   The data collection includes the number of visitors, where they visit the
   website, and the pages visited.

 * Cookie
   _clck
 * Duration
   1 year
 * Description
   Microsoft Clarity sets this cookie to retain the browser's Clarity User ID
   and settings exclusive to that website. This guarantees that actions taken
   during subsequent visits to the same website will be linked to the same user
   ID.

 * Cookie
   cb_group_id
 * Duration
   1 year
 * Description
   Clearbit sets this cookie to track page views and traits for Clearbit.

 * Cookie
   cb_anonymous_id
 * Duration
   1 year
 * Description
   Clearbit sets this cookie to track page views and traits for Clearbit.

 * Cookie
   _clsk
 * Duration
   1 day
 * Description
   Microsoft Clarity sets this cookie to store and consolidate a user's
   pageviews into a single session recording.

 * Cookie
   ajs_anonymous_id
 * Duration
   1 year
 * Description
   This cookie is set by Segment to count the number of people who visit a
   certain site by tracking if they have visited before.

 * Cookie
   __hstc
 * Duration
   5 months 27 days
 * Description
   Hubspot set this main cookie for tracking visitors. It contains the domain,
   initial timestamp (first visit), last timestamp (last visit), current
   timestamp (this visit), and session number (increments for each subsequent
   session).

 * Cookie
   hubspotutk
 * Duration
   5 months 27 days
 * Description
   HubSpot sets this cookie to keep track of the visitors to the website. This
   cookie is passed to HubSpot on form submission and used when deduplicating
   contacts.

 * Cookie
   _ga_*
 * Duration
   1 year 1 month 4 days
 * Description
   Google Analytics sets this cookie to store and count page views.

 * Cookie
   MR
 * Duration
   7 days
 * Description
   This cookie, set by Bing, is used to collect user information for analytics
   purposes.

 * Cookie
   SM
 * Duration
   session
 * Description
   Microsoft Clarity cookie set this cookie for synchronizing the MUID across
   Microsoft domains.

 * Cookie
   FPLC
 * Duration
   20 hours
 * Description
   Google Tag Manager sets this cookie for tracking between domains.

 * Cookie
   FPID
 * Duration
   1 year 1 month 4 days
 * Description
   Google Tag Manager sets this cookie for server-side tagging.

 * Cookie
   _gcl_au
 * Duration
   3 months
 * Description
   Google Tag Manager sets the cookie to experiment advertisement efficiency of
   websites using their services.

 * Cookie
   _gid
 * Duration
   1 day
 * Description
   Google Analytics sets this cookie to store information on how visitors use a
   website while also creating an analytics report of the website's performance.
   Some of the collected data includes the number of visitors, their source, and
   the pages they visit anonymously.

 * Cookie
   ahoy_visit
 * Duration
   4 hours
 * Description
   This cookie is set by Powr for analytics measurement.

 * Cookie
   ahoy_visitor
 * Duration
   1 year 1 month 4 days
 * Description
   This cookie is set by Powr for analytics measurement.

Performance


Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.

 * Cookie
   SRM_B
 * Duration
   1 year 24 days
 * Description
   Used by Microsoft Advertising as a unique ID for visitors.

 * Cookie
   _gat
 * Duration
   1 minute
 * Description
   Google Universal Analytics sets this cookie to restrain request rate and thus
   limit data collection on high-traffic sites.

Advertisement


Advertisement cookies are used to provide visitors with customized
advertisements based on the pages you visited previously and to analyze the
effectiveness of the ad campaigns.

 * Cookie
   cb_user_id
 * Duration
   1 year
 * Description
   Clearbit sets this cookie to collect data on visitors. This information is
   used to assign visitors into segments, making website advertising more
   relevant.

 * Cookie
   MUID
 * Duration
   1 year 24 days
 * Description
   Bing sets this cookie to recognise unique web browsers visiting Microsoft
   sites. This cookie is used for advertising, site analytics, and other
   operations.

 * Cookie
   ANONCHK
 * Duration
   10 minutes
 * Description
   The ANONCHK cookie, set by Bing, is used to store a user's session ID and
   verify ads' clicks on the Bing search engine. The cookie helps in reporting
   and personalization as well.

 * Cookie
   test_cookie
 * Duration
   15 minutes
 * Description
   doubleclick.net sets this cookie to determine if the user's browser supports
   cookies.

 * Cookie
   IDE
 * Duration
   1 year 24 days
 * Description
   Google DoubleClick IDE cookies store information about how the user uses the
   website to present them with relevant ads according to the user profile.

Uncategorized


Other uncategorized cookies are those that are being analyzed and have not been
classified into a category as yet.

 * Cookie
   recent_write
 * Duration
   Less than a minute
 * Description
   Description is currently not available.

 * Cookie
   intercom-id-j0dzii6j
 * Duration
   8 months 26 days 1 hour
 * Description
   Description is currently not available.

 * Cookie
   intercom-session-j0dzii6j
 * Duration
   7 days
 * Description
   Description is currently not available.

 * Cookie
   intercom-device-id-j0dzii6j
 * Duration
   8 months 26 days 1 hour
 * Description
   Description is currently not available.

 * Cookie
   gtm_id
 * Duration
   1 year
 * Description
   No description available.

 * Cookie
   keen
 * Duration
   1 year
 * Description
   Description is currently not available.

 * Cookie
   session
 * Duration
   never
 * Description
   No description available.

 * Cookie
   debug
 * Duration
   never
 * Description
   No description available.

 * Cookie
   __tld__
 * Duration
   session
 * Description
   Description is currently not available.

 * Cookie
   ph_phc_Tbfg4EiRsr5iefFoth2Y1Hi3sttTeLQ5RV5TLg4hL1W_posthog
 * Duration
   1 year
 * Description
   Description is currently not available.

 * Cookie
   _ph
 * Duration
   session
 * Description
   Description is currently not available.

 * Cookie
   pfjs%3Acookies
 * Duration
   1 year
 * Description
   Description is currently not available.

 * Cookie
   cb%3Atest
 * Duration
   1 year
 * Description
   Description is currently not available.

 * Cookie
   _pk_id.f8908bf0-c824-4f3f-9bc9-22cac096e678.ab37
 * Duration
   1 year 27 days
 * Description
   Description is currently not available.

 * Cookie
   _pk_ses.f8908bf0-c824-4f3f-9bc9-22cac096e678.ab37
 * Duration
   30 minutes
 * Description
   Description is currently not available.

Reject All Save My Preferences Accept All
Powered by
Menu

Close

ProductPricingAboutBlogTrust CenterContact
Product

FeaturesWhy Aikido?
DocsAboutCareers

LoginStart Free


LoginStart Free


GET YOUR WEB APP SECURED IN NO TIME



Get an instant overview of all your code & cloud security issues.
Quickly triage & fix high risk vulnerabilities.


Start for FreeBook a Demo


First results in 60 seconds · No credit card required




Covers all vulnerabilities

Automatic triage & deduplication

First results in 30 seconds

Try for free

Covers all vulnerabilities

Automatic triage & deduplication

First results in 30 seconds

Try for free

Covers all vulnerabilities

Automatic triage & deduplication

First results in 30 seconds

Try for free

Covers all vulnerabilities

Automatic triage & deduplication

First results in 30 seconds

Try for free

Covers all vulnerabilities

Automatic triage & deduplication

First results in 30 seconds

Try for free

Covers all vulnerabilities

Automatic triage & deduplication

First results in 30 seconds

Try for free

These cloud-native companies can finally sleep at night

and

CertifID
,

FinTech SaaS · 20+ developers

and

Lighthouse
,

Enterprise SaaS · 50+ developers

and

Zus Health
,

HealthTech SaaS · 20+ developers

and

Henchman
,

LegalTech SaaS · 20+ developers

and

Secure Code Warrior
,

EdTech SaaS · 90+ developers

and

Cronos Security
,

Technology Company Group · 9000+ employees

and

Oliva Health
,

HealthTech SaaS · 25+ developers

9-in-1 Security Scanners



Sure, you can juggle between multiple security tools with confusing pricing
models. Tools that will overload you with irrelevant alerts and false positives.



Or you could get Aikido

1


CLOUD POSTURE MANAGEMENT (CSPM)



Detects cloud infrastructure risks across major cloud providers.

Alternative for

Orca Security,
CloudSploit
2


OPEN SOURCE DEPENDENCY SCANNING (SCA)



Continuously monitors your code for known vulnerabilities, CVEs and other risks.

Alternative for

Snyk,
Dependabot
3


SECRETS DETECTION



Checks your code for leaked and exposed API keys, passwords, certificates,
encryption keys, etc...

Alternative for

GitGuardian,
Gitleaks
4

New




STATIC CODE ANALYSIS (SAST)




Scans your source code for security risks before an issue can be merged.

Alternative for

Veracode,
Mend
5


INFRASTRUCTURE AS CODE SCANNING (IAC)



Scans Terraform, CloudFormation & Kubernetes infrastructure-as-code for
misconfigurations.

Alternative for

Bridgecrew,
Lightspin
6


CONTAINER SCANNING



Scans your container OS for packages with security issues.

Alternative for

Snyk
7


SURFACE MONITORING (DAST)



Dynamically tests your web app’s front-end to find vulnerabilities through
simulated attacks. Built on ZAP.

Alternative for

Detectify
8


OPEN SOURCE LICENSE SCANNING



Monitors your licenses for risks such as dual licensing, restrictive terms, bad
reputation, etc..

Alternative for

Fossology,
Black Duck
9


MALWARE DETECTION IN DEPENDENCIES



Prevents malicious packages from infiltrating your software supply chain.
Powered by Phylum.

Alternative for

Socket
10


CONNECT YOUR OWN SCANNER



Imports and auto-triages findings from your current scanner stack.

Import from

SonarQube,
Github Advanced Security
Integrate security in your development

workflow
Integrate security in your development

workflow
Integrate security in your development

workflow
Integrate security in your development

workflow
Integrate security in your development

workflow
Integrate security in your development

workflow
Integrate security in your development

workflow
Integrate security in your development

workflow
Integrate security in your development

workflow


Instead of adding another UI to check, Aikido integrates with the tools you
already use. We'll notify you when it's important.



1


SUPPORTS YOUR TECH STACK & LANGUAGES

1

We support all major version control providers, cloud providers & languages.
check out all integrations ➜



Keep scrolling

2


WORKS WHERE YOU WORK



Connect your task management, messaging tool, compliance suite & CI to track &
solve issues in the tools you already use.
check out all integrations ➜


Keep scrolling


3


TRIAGE IN MINUTES,
NOT HOURS



Triage meetings can be painful, but not with our intuitive interface. When the
goal is to triage & assign rather than research, you'll be in and out in no time


Keep scrolling


Features


Only get alerts

that matter to
you.
your environment.
your risk tolerance.

We’ve been there, sifting through hundreds of security alerts, only a few that
matter. After a while you ignore them, let them stack up, creating additional
risk.


WE'LL TAKE THE SIFTING OFF YOUR HANDS, ONLY NOTIFYING YOU WHEN YOU NEED TO TAKE
ACTION.





DEDUPLICATION

Groups related issues so you can quickly solve as many issues as possible.


AUTO-TRIAGE

Analyzes & monitors your codebase and infrastructure to automatically filter out
issues that don’t affect you.


CUSTOM RULES

Set up custom rules to filter out the irrelevant paths, packages etc. You’ll
still get alerted when there’s a critical issue.


CVEs



ACTIONABLE DOCUMENTATION FOR DEVELOPERS, NOT SECURITY EXPERTS

1

We translate Common Vulnerabilities & Exposures (CVEs) into human-readable
language so you understand the problem and if it affects you. Skip the research
& find a solution fast.


THE ONLY PLATFORM THAT SATISFIES ALL CODE&CLOUD SECURITY NEEDS FOR SCALING DEV
TEAMS



You had to choose between these two before.
Now you have a better option.

Option 1

Combine a patchwork of free tools.

Option 2

Buy complex & expensive software.

Aikido


USE AIKIDO’S SIMPLE, AFFORDABLE, ALL-IN-ONE SOLUTION.

Hide

Compare



Cloud posture management (CSPM)




Open source dependency scanning (SCA)




Secrets detection

Enterprise only


Static code analysis (SAST)

Enterprise only
Extra cost

Infrastructure as code scanning (IaC)


Extra cost

Container scanning


Extra cost

Surface monitoring (DAST)




Open source license scanning



Cloud only
Compliance Reports (SOC 2, ISO 27001 & more)


Extra cost

Malware detection in dependencies





Trust



TAKING CARE OF YOUR DATA LIKE IT’S OUR OWN

More to explore

Documentation

Trust center

Integrations




CHOOSE THE REPOS YOURSELF


1

When you log in with your version control system (VCS) we don’t get access to
any of your repositories. You can manually give read-only access to the
repositories you’d like to scan.


READ-ONLY ACCESS


2

We can’t change any of your code.


NO KEYS ON OUR SIDE


3

You log in with your Github, Gitlab or Bitbucket account so we can’t store/view
keys.


SHORT-LIVED ACCESS TOKENS


4

Can only be generated with a certificate, stored in AWS secrets manager.


SEPARATE DOCKER CONTAINER


5

Every scan generates a separate docker container which gets hard-deleted right
after analysis is done.


DATA WON’T BE SHARED - EVER!

We’re implementing security best practices aligned with the highest standards.


SOC 2

Compliant
27001

Compliant


WHEN DEVELOPMENT TEAMS SWITCH TO  , THEY'RE BLOWN AWAY



Without
1

Juggling multiple DevSecOps tools

2

Getting overloaded with irrelevant security alerts

3

Trying to understand PhD-level documentation on fixes

4

Spending hours setting up multiple repos & clouds

With
1

Have an all-in-one tool that covers 99% of threats

2

Get 85% less irrelevant alerts

3

Fix issues fast with stupidly simple explanations

4

Set up repos & cloud config in less than a minute



Review




AIKIDO SECURITY COMBINES ALL THE ESSENTIAL SECURITY SCANNING SUCH AS REPO
SCANNING, CLOUD SECURITY, CREDENTIAL LEAKAGE, ... IN ONE PACKAGE THAT'S EASY TO
USE BY ANY DEVELOPMENT TEAM.

Pieter Schelfhout, FintTech Startup CTO


FREQUENTLY ASKED Q'S


1
How does Aikido know which alerts are relevant?
How does Aikido know which alerts are relevant?
How does Aikido know which alerts are relevant?
We’ve built a rule engine that takes the context of your environment into
account. This allows us to easily adapt the criticality score for your
environment & filter out false positives. If we’re not sure, the algorithm
always reverts to the safest option...
2
What happens to my data?
What happens to my data?
What happens to my data?
We clone the repositories inside of temporary environments (such as docker
containers unique to you). Those containers are disposed of, after analysis. The
duration of the test and scans themselves take about 1-5 mins. By default, all
the clones and containers are then auto-removed after that, always, every time,
for every customer. This process repeats every 24 hours, to provide continuous
monitoring.
3
Does Aikido make changes to my codebase?
Does Aikido make changes to my codebase?
Does Aikido make changes to my codebase?
We can’t & won’t, this is guaranteed by read-only access.
4
Can I try it with a test account?
Can I try it with a test account?
Can I try it with a test account?
Of course! When you sign up with your git, just don’t give access to any repo &
select the demo repo instead!
5
How is Aikido different?
How is Aikido different?
How is Aikido different?
Aikido combines features from lots of different platforms in one. By bringing
together multiple tools in one platform, we’re able to contextualize
vulnerabilities, filter out false positives and reduce noise by 95%.
6
How can I trust Aikido?
How can I trust Aikido?
How can I trust Aikido?
We’re doing everything we can to be fully secure & compliant. Aikido has been
examined to attest that its system and the suitability of the design of controls
meets the AICPA's SOC 2 Type II & ISO 27001:2022 requirements. Visit our Trust
page to learn more about our security practices.

“We started using Snyk but our developers just didn’t get it. It’s just too
complex, if you’re not a security engineer. We tried Aikido and didn’t look
back.”

"There is no one who loves pain itself, who seeks after it and wants to have it,
simply because it is pain...



"There is no one who loves pain itself, who seeks after it and wants to have it,
simply because it is pain...



"There is no one who loves pain itself, who seeks after it and wants to have it,
simply because it is pain...


Swipe Left

Keep Scrolling



NO NEED TO TALK TO SALES



Connect your GitHub, GitLab, Bitbucket or Azure DevOps account to start scanning
your repos for free.


Start for Free

Your data won't be shared · Read-only access
Use keyboard



to navigate through articles
Visit our Blog
By

Roeland Delrue


ISO 27001 CERTIFICATION: 8 THINGS WE LEARNED

Guides
December 5, 2023
Read more
By

Roeland Delrue


CRONOS GROUP CHOOSES AIKIDO SECURITY TO STRENGTHEN SECURITY POSTURE FOR ITS
COMPANIES AND CUSTOMERS

News
November 30, 2023
Read more
By

Bart Jonckheere


HOW LOCTAX USES AIKIDO SECURITY TO GET RID OF IRRELEVANT SECURITY ALERTS & FALSE
POSITIVES

News
November 22, 2023
Read more
By

Felix Garriau


AIKIDO SECURITY RAISES €5M TO OFFER A SEAMLESS SECURITY SOLUTION TO GROWING SAAS
BUSINESSES

News
November 9, 2023
Read more
By

Roeland Delrue


AIKIDO SECURITY ACHIEVES ISO 27001:2022 COMPLIANCE

News
November 8, 2023
Read more
By

Felix Garriau


HOW STORYCHIEF’S CTO USES AIKIDO SECURITY TO SLEEP BETTER AT NIGHT

News
October 24, 2023
Read more
By

Willem Delbare


WHAT IS A CVE?

Guides
October 17, 2023
Read more
By

Willem Delbare


TOP 3 WEB APPLICATION SECURITY VULNERABILITIES IN 2023

Engineering
September 27, 2023
Read more
By

Felix Garriau


NEW AIKIDO SECURITY FEATURES: AUGUST 2023

News
August 22, 2023
Read more
By

Felix Garriau


AIKIDO’S 2023 SAAS CTO SECURITY CHECKLIST

News
August 10, 2023
Read more
By

Felix Garriau


CLOUD AND CODE SECURITY CHALLENGES: 15 SAAS CTOS SPILL THE BEANS

Engineering
July 25, 2023
Read more
By

Willem Delbare


WHAT IS OWASP TOP 10, AND DO YOU NEED IT TO SECURE YOUR APPLICATION?

Guides
July 12, 2023
Read more
By

Willem Delbare


HOW TO BUILD A SECURE ADMIN PANEL FOR YOUR SAAS APP

Guides
July 11, 2023
Read more
By

Roeland Delrue


HOW TO PREPARE YOURSELF FOR ISO 27001:2022

Guides
July 5, 2023
Read more
By

Willem Delbare


PREVENTING FALLOUT FROM YOUR CI/CD PLATFORM BEING HACKED

Guides
June 19, 2023
Read more
By

Felix Garriau


HOW TO CLOSE DEALS FASTER WITH A SECURITY ASSESSMENT REPORT

News
June 12, 2023
Read more
By

Willem Delbare


A GUIDE TO AUTOMATING TECHNICAL VULNERABILITY MANAGEMENT (FOR SOC 2)

Guides
June 5, 2023
Read more
By

Willem Delbare


PREVENTING ALL PROTOTYPE POLLUTION IN YOUR REPOSITORY WITH ONE ACTION

Guides
June 1, 2023
Read more
By

Willem Delbare


HOW DOES A SAAS STARTUP CTO BALANCE DEVELOPMENT SPEED AND SECURITY?

Guides
May 16, 2023
Read more
By

Willem Delbare


HOW A STARTUP’S CLOUD GOT TAKEN OVER BY A SIMPLE FORM THAT SENDS AN EMAIL

Engineering
April 10, 2023
Read more
By

Felix Garriau


AIKIDO SECURITY RAISES €2 MILLION PRE-SEED ROUND TO BUILD A DEVELOPER-FIRST
SOFTWARE SECURITY PLATFORM

News
January 19, 2023
Read more
Company
ProductPricingAboutCareersContact
Resources
DocsPublic API DocsBlogIntegrationsGlossaryPress Kit
Security
Trust CenterSecurity OverviewChange Cookie Preferences
Legal
Cookie Policy
Privacy Policy & GDPR
Terms of Use
Use Cases
CompliancySecure Your Code
Alternative to
Snyk AlternativeDependabot AlternativeGuardrails Alternative
Industries
For HealthTech
Connect
hello@aikido.dev
LinkedInX
Subscribe
Stay up to date with all updates
Not quite there yet.
👋🏻 Thank you! You’ve been subscribed.

Team Aikido
Not quite there yet.

© 2023 Aikido Security BV | BE0792914919
Mail: Coupure Rechts 88, 9000 Ghent, Belgium | Office: Grauwpoort 1, 9000 Ghent,
Belgium
SOC 2

Compliant
ISO 27001

Compliant