Zams recognises that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.
As a service provider/product, we understand the importance in providing clear information about our security practices, tools, resources and responsibilities within Zams so that our customers can feel confident in choosing us as a trusted provider.
This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.
Here are the subprocessors that Zams uses to process data in its infrastructure and business operations.
Github App
Development software
Slack for access
Collaboration
Microsoft Azure
IT infrastructure
Rippling
HRMS
Sentry
Analytics
Google Workspace
IAM providers
GCP
IT infrastructure
Intercom
Customer Service
AWS
IT infrastructure
OpenAI
Artificial Intelligence
Cloudflare
Hosting Providers
Slack
Collaboration & Productivity