Security

Overview

Jam's security infrastructure meets enterprise standards with SOC 2 Type II compliance, end-to-end encryption, and robust cloud protection. Your data stays secure while your team stays productive.

Security Certifications

Jam is compliant with SOC 2 Type II with annual audits and quarterly vulnerability assessments.

Security Certification
Status

SOC 2 Type II

Compliant

GDPR

Compliant

HIPPA

Soon

Enterprise Security Features

Available to workspaces on our Enterprise plans.

Custom Data Retention

Control how long Jams stay in your workspace with custom deletion schedules.

Enable Enterprise Security Features

Contact our sales team to upgrade to Enterprise. Work with our team to configure SSO, audit logs, and retention policies. Begin using enhanced security features immediately after setup

Contact

Security Monitoring

Request SOC 2 Report

Email [email protected] with your request Include your company information and intended use. Our team will verify your qualifications and provide the report.

Report Security Issues

Email [email protected] with details. Our security team responds as quickly as possible. We'll keep you updated throughout the investigation process

FAQs

Where is my data stored?

All data is stored in Google Cloud Platform's Central US region with Cloudflare providing global CDN services.

How often does Jam perform security testing?

We conduct quarterly vulnerability scans and annual penetration tests as required by SOC 2 Type II compliance.

Does Jam have intrusion detection systems?

Jam uses Cloudflare for attack prevention and Google Cloud Platform (GCP) firewalls for infrastructure protection. Since our network is fully managed by GCP, we don't run separate IDS/IPS systems.

Does Jam have a bug bounty program?

We don't currently offer a bug bounty program, but we welcome security reports at [email protected] and respond promptly to all submissions.

Last updated

Was this helpful?