Cyberday Inc. Subprocessors
Security
Cyberday provides an AI-powered Information Security Management System (ISMS) to help organizations improve and certify their cybersecurity.
| Name | Category | Purpose | Country | Data Processed |
|---|---|---|---|---|
| Salesforce.com, Inc. | Cloud Infrastructure | Heroku-platform is used to operate system level services on which code produced by Agendium runs. | Offering capacity, no role in proper data processing | |
| Microsoft Corporation DPA | Cloud Infrastructure | Microsoft Azure-platforms different components are used to provide and maintain services. | Offering processing capacity, no role in proper data processing | |
| Amazon Web Services | Cloud Infrastructure | AWS S3-platform is used to save, distribute and process files related to the service. | Files and data saved in the services, reports generated in the service | |
| Auth0, Inc. | Security | When authentication is done using Cyberday user account, Auth0 authenticates the user with authentication methods chosen by the user. | Authentication information used in the service | |
| Intercom R&D Unlimited Company | Customer Support | The customers use of Cyberday is supported with chat support and by informing customers about the latest development in the service. | User identification info, support chat conversations | |
| Twilio, Inc. | Communications | Enabling text message authentication, when Microsoft Teams is not used. | User phone number | |
| The Rocket Science Group (MailChimp) | Delivering email invites to users by admins and tracking delivery status. | User email | ||
| Datadog Inc. | Monitoring | Datadog is used to collect and analyse log data related to the service. | User's email address and browser details, IP address, event logs on the service |
No changes recorded yet. Changes will appear here after the next scan detects updates.
Summary
8
Total Subprocessors
3
Countries
6
Categories
50%
in United States
Subprocessors by Country
Subprocessors by Category
Biggest overlap with
Other companies using the most of the same subprocessors
Common in your industry
Top subprocessors used by other Security companies