Save 8 hours per comparisonNo credit card
SpecLens Logo
Enterprise Security
SOC 2 In Progress

Security & Trust

Enterprise-grade security for your procurement data. We protect your vendor specifications with the same standards used by Fortune 500 companies.

AES-256
Encryption
SOC 2
In Progress
SSO
Supported
Enterprise
Ready

Security Features

AES-256 Encryption

All data encrypted at rest using AES-256, the same standard used by governments and financial institutions.

TLS 1.3 In Transit

All data transmitted using TLS 1.3, the latest and most secure transport protocol.

SSO Support

SAML 2.0 integration with Okta, Azure AD, Google Workspace, and other identity providers.

Role-Based Access

Granular permissions control who can view, edit, and export comparison data.

Audit Logging

Comprehensive activity logs track every action for compliance and security review.

SOC 2 In Progress

Actively working toward SOC 2 Type II certification. Our security controls are built to meet SOC 2 standards.

Compliance & Certifications

SOC 2 Type II (In Progress)
GDPR Compliant
CCPA Compliant
Regular Penetration Testing
Vendor Security Assessments
Incident Response Plan

Data Handling

Document Processing

Uploaded documents are processed in isolated environments and can be deleted on demand.

Data Residency

Data stored in secure cloud infrastructure with options for regional data residency.

Retention Policies

Configurable data retention with automatic purging based on your requirements.

Export & Deletion

Full data export and permanent deletion capabilities for data portability.

Security FAQ

Where is my data stored?

Data is stored in secure cloud infrastructure (SOC 2 certification in progress). Enterprise customers can request specific data residency options.

Can I delete my data?

Yes. You can delete any comparison or document at any time. For complete account deletion, contact support and we'll permanently remove all data within 30 days.

Do you train AI on my documents?

No. Your documents are never used to train our AI models. Document content is processed for extraction only and is not retained for model training.

Need a Security Review?

Enterprise teams can request our security documentation and schedule a security review call with our team.