Industry-standard
best practices
SOC II Type II Compliance
Navattic’s security posture is audited annually by external auditors. We are SOC II Type 2 compliant with zero exceptions reported.
Annual third-party security testing
Yearly penetration-testing audits conducted by a third-party. See below for information about obtaining a report.
Hosted on trusted cloud architecture
Hosted and served on cloud providers like Cloudflare and AWS that have the highest standards for security requirements.
Frequently asked questions
- Is Navattic SOC II compliant?
- Yes, Navattic achieved SOC II Type 2 compliance with zero exceptions. To access the report, please send an email security@navattic.com
- Where can I find the list of data subprocessors?
- For more information on other companies that process data, see our List of Subprocessors.
- Do you have a pen test report available to share?
- Yes, Navattic completes third party penetration tests annually. To request access to our latest pen test report, send an email to security@navattic.com.
- How is data encrypted?
- Our platform uses encryption at rest (AES-256) and in transit (HTTPS/TLS).
- What is the process for reporting security issues?
- If you are interested in submitting a security issue, first please read about our Responsible disclosure program, and then send an email to security@navattic.com
Interested in learning more?
Responsible Disclosure Program
Our program to facilitate the responsible disclosure of possible security vulnerabilities
Privacy Policy
How we handle collect, use, and disclose data from the Navattic website and services
Security Overview
A cursory overview of the infrastructure and operational security practices of Navattic
Data Processing Agreement
An overview of Navattic's data processing policies and procedures
List of Subprocessesors
Information on the location, role, and identity of our subprocessesors
Get started
Build demos that delight.
Unlock faster sales cycles and empower your go-to-market team to drive growth with your product.