Announcing our $28M Series A. Read More

Security and compliance, built in.

Everything in Conversion is designed with security, privacy, and compliance in mind, from how access is managed to how data is logged, audited, and shared.

Enterprise-grade security

Built with security-first infrastructure and controls, aligned with modern SaaS best practices.

preview images of the conversion app for enterprise customers
SOC 2 Type II compliant

Conversion has completed a SOC 2 Type II audit. Reports available upon request.

image showing custom data models
GDPR compliant

Committed to compliance with the EU General Data Protection Regulation (GDPR).

image showing a search bar in which you can search for multiple dynamic filters within the conversion app
Admin controls

Restrict access to system-level permissions and sensitive actions.

preview images of the conversion app for enterprise customers
Audit logs

Comprehensive audit logs track user activity and data sent to connected third-party applications.

image showing custom data models
App approvals

Control which third-party applications can access your Conversion workspace.

image showing a search bar in which you can search for multiple dynamic filters within the conversion app
Single sign-on (SSO)

Authenticate via any SAML-compatible identity provider.

preview images of the conversion app for enterprise customers
Identity provisioning (SCIM)

Provision and deprovision users automatically through your identity provider.

image showing custom data models
Advanced login security

Support for passkeys, domain claiming, and login method restrictions.

image showing a search bar in which you can search for multiple dynamic filters within the conversion app
Identity provider support

Works with Google, Entra, Okta, OneLogin, LastPass, Auth0, Bitium, and more.

Frequently Asked Questions

Experience how an AI-native platform approaches security, privacy, and data handling differently from legacy marketing automation.

Book a demo
Where can I find your privacy policy?

You can find it here!

How do you process our customer data?

You can read more about our processing guidelines through our Data Processing Agreement.

Where can I find relevant security documentation?

You can request relevant security documentation through our Trust Center.

Do you train AI models on our data?

No we do not. We work with trusted third party model providers that explicitly prohibit model training on customer data.

How do you communicate service outages?

We communicate service-impacting outages via our status page.

How do you encrypt data?

We force HTTPS on all connections and encrypt data in-transit with TLS 1.2. All data at-rest is secured using AES 256-bit encryption.