Eye Security Subprocessors
Security
Eye Security provides managed detection and response (MDR) services along with cyber insurance to protect businesses from cyber threats.
| Name | Category | Purpose | Country | Data Processed |
|---|---|---|---|---|
| Amazon Web Services ↗ | Cloud Infrastructure | Used to host customer and end-user data and provide backend infrastructure for Eye Security services. | EEA | Customer and end-user data |
| PagerDuty ↗ | Communications | Used to escalate and manage customer alerts and incidents. | EEA | Customer alerts and incidents |
| Slack ↗ | Communications | Used for internal communication to manage customer incidents, alerts, and support coordination. | EEA | Internal communication data |
| ShareFile ↗ | File Sharing | Used to securely exchange electronic documents with customers when requested. | EEA | Electronic documents |
| CrowdStrike ↗ | Security | Used by Eye Security to detect and respond to endpoint threats, including processing device and credential data, when designated by the customer. | Frankfurt, Germany | Device and credential data |
| HubSpot ↗ | CRM | Used to manage customer contact data, communication history, and preferences. | EEA | Customer contact data |
| Chargebee ↗ | Billing | Used to manage customer subscriptions, billing, and contractual data. | EEA | Customer subscriptions and billing data |
| Phished.io ↗ | Training | Used to conduct phishing simulations and train employees using provided email addresses. | Employee email addresses | |
| Airbyte ↗ | Data Platform | Used to integrate and transfer data from multiple sources into centralized storage for analysis and processing. | EEA | Data from multiple sources |
| Snowflake ↗ | Data Warehouse | Used to securely store and process large volumes of structured data with scalable cloud-based architecture. | Frankfurt, Germany | Structured data |
| Metabase ↗ | Analytics | Used to visualize and analyze data through dashboards and queries, enabling easy access to business insights. | Frankfurt, Germany | Business data |
| dbt ↗ | Data Platform | Used to transform, test, and document data models directly in the data warehouse for reliable analytics. | Frankfurt, Germany | Data models |
| Juro ↗ | Document Management | Used by Eye Security as a contract management platform to create, store, and manage legal agreements, including processing customer contact and contractual information. | EEA | Customer contact and contractual information |
| Microsoft 365 ↗ | Productivity | Used by Eye Security to provide email, document storage, and collaboration services, including processing customer and end-user data such as contact details and communication content. | EEA | Customer and end-user data |
| Exact Online ↗ | Accounting | Used by Eye Security to manage accounting, invoicing, and financial administration processes, including processing customer billing and contractual information. | EEA | Customer billing and contractual information |
| Frontegg ↗ | Authentication | Used by Eye Security to provide secure user authentication, authorization, and account management features, including processing user credentials and profile information. | EEA | User credentials and profile information |
| ANVA Hub - Insurance ↗ | Insurance | Used by Eye Security to manage insurance-related processes, including policy administration, financial transactions, and customer data in a secure cloud environment. | EEA | Customer data |
| Microsoft Sentinel ↗ | Security | Used by Eye Security to manage cloud security environments, when designated by the customer. | EEA | Cloud security data |
| Microsoft Defender ↗ | Security | Used by Eye Security to detect and respond to endpoint threats, including processing device and credential data, when designated by the customer. | EEA | Device and credential data |
| SentinelOne ↗ | Security | Used by Eye Security to detect and respond to endpoint threats, including processing device and credential data, when designated by the customer. | EEA | Device and credential data |
| Mezmo ↗ | Data Platform | Used by Eye Security to connect to customer for log ingestion and hot storage. | EEA | Log data |
Your data may flow beyond direct subprocessors. Click to expand and see the chain.
Loading data flow...
No changes recorded yet. Changes will appear here after the next scan detects updates.
Summary
21
Total Subprocessors
4
Countries
15
Categories
76%
in EEA
Subprocessors by Country
Subprocessors by Category
Biggest overlap with
Other companies using the most of the same subprocessors
Common in your industry
Top subprocessors used by other Security companies