Subprocessor List

This list details the third-party subprocessors authorized to process personal data on our behalf in connection with the provision of our services. We engage these subprocessors to support various functions such as cloud hosting, communication, customer relationship management, security, email authentication monitoring, advertising, and artificial intelligence services. This list is maintained in compliance with applicable privacy laws. We ensure that appropriate data processing agreements are in place with each subprocessor to protect personal data.

We may update this list from time to time. 

Last Updated: October 24, 2025

SubprocessorEntityPurpose of ProcessingLocation
1PasswordAgileBits Inc.Password management and securityCanada
6sense6sense Insights, Inc.Account-based marketing and sales orchestrationUnited States
AddigyAddigy, Inc.Apple device management and IT operationsUnited States
Anthropic ClaudeAnthropic, PBCArtificial intelligence services and processingUnited States
AWSAmazon Web Services, Inc.Cloud infrastructure and hosting servicesUnited States
BlackKiteBlack Kite, Inc.Third-party cyber risk intelligence and monitoringUnited States
CloudflareCloudflare, Inc.Content delivery, DDoS protection, and web securityUnited States
CopilotMicrosoft CorporationArtificial intelligence services and productivity toolsUnited States
CrowdStrikeCrowdStrike, Inc.Endpoint protection and cybersecurity servicesUnited States
DMARC DigestsAC PM LLC (Postmark)DMARC reporting and email authentication analysisUnited States
DocuSignDocuSign, Inc.Electronic signature and document managementUnited States
ExpelExpel, Inc.Managed detection and response for cybersecurityUnited States
Google AdWordsGoogle LLCOnline advertising and marketingUnited States
Google GeminiGoogle LLCArtificial intelligence services and processingUnited States
Google WorkspaceGoogle LLCEmail, productivity, and collaboration toolsUnited States
GrokxAIArtificial intelligence services and processingUnited States
HubSpotHubSpot, Inc.Customer relationship management (CRM) and marketing automationUnited States
LinkedInLinkedIn CorporationProfessional networking and advertisingUnited States
Microsoft TeamsMicrosoft CorporationTeam collaboration and communication platformUnited States
NetcraftNetcraft LtdPhishing detection and cybercrime disruption servicesUnited Kingdom
OpenAIOpenAI, L.P.Artificial intelligence services and processingUnited States
QuickBooksIntuit Inc.Accounting and financial managementUnited States
RampRamp Business CorporationExpense management and corporate card servicesUnited States
SlackSlack Technologies, LLCInternal team communication and collaborationUnited States
SignalSignal FoundationEncrypted internal team communicationUnited States
ZoomZoom Video Communications, Inc.Video conferencing and virtual meetingsUnited States
Is your Cyber Insurance really going to cover you?

Only 1/3 of cyber insurance policies actually pay out in incidents. Most companies have cyber insurance policies that insure too little, or too much, and have absurdly low caps and silly exclusions.

To learn more about cyber insurance and determine if you have the right coverage for you, join us for a free vCISO Office Hours session on Tuesday, April 18 at 1 p.m. eastern time. Bring your questions!

New Release: Free SOC 2 eBook!

Getting ready for your first SOC 2? This eBook is full of actionable advice to help you prepare for and succeed in your first SOC 2 audit.

Learn:

  • How to scope your SOC 2 project
  • How to estimate the cost and length of your SOC 2 project
  • How to prepare for your SOC 2
  • How to succeed in your SOC 2 audit period
  • How to leverage your SOC 2 report to enable your business and sales