Save 8 hours per comparisonNo credit card
SpecLens Logo
Enterprise Security
SOC 2 Compliant

Security & Trust

Enterprise-grade security for your procurement data. We protect your vendor specifications with the same standards used by Fortune 500 companies.

AES-256
Encryption
SOC 2
Certified
SSO
Supported
Enterprise
Ready

Security Features

AES-256 Encryption

All data encrypted at rest using AES-256, the same standard used by governments and financial institutions.

TLS 1.3 In Transit

All data transmitted using TLS 1.3, the latest and most secure transport protocol.

SSO Support

SAML 2.0 integration with Okta, Azure AD, Google Workspace, and other identity providers.

Role-Based Access

Granular permissions control who can view, edit, and export comparison data.

Audit Logging

Comprehensive activity logs track every action for compliance and security review.

SOC 2 Compliance

SOC 2 Type II certified, demonstrating our commitment to security best practices.

Compliance & Certifications

SOC 2 Type II Certified
GDPR Compliant
CCPA Compliant
Regular Penetration Testing
Vendor Security Assessments
Incident Response Plan

Data Handling

Document Processing

Uploaded documents are processed in isolated environments and can be deleted on demand.

Data Residency

Data stored in secure cloud infrastructure with options for regional data residency.

Retention Policies

Configurable data retention with automatic purging based on your requirements.

Export & Deletion

Full data export and permanent deletion capabilities for data portability.

Security FAQ

Where is my data stored?

Data is stored in secure, SOC 2 certified cloud infrastructure. Enterprise customers can request specific data residency options.

Can I delete my data?

Yes. You can delete any comparison or document at any time. For complete account deletion, contact support and we'll permanently remove all data within 30 days.

Do you train AI on my documents?

No. Your documents are never used to train our AI models. Document content is processed for extraction only and is not retained for model training.

Need a Security Review?

Enterprise teams can request our security documentation, SOC 2 report, and schedule a security review call.