White Circle Subprocessors
Security
White Circle detects and fixes AI vulnerabilities automatically, keeping your system under control.
| Name | Category | Purpose | Country | Data Processed |
|---|---|---|---|---|
| Amazon Web Services | Cloud Infrastructure | Cloud provider | - | - |
| Stripe | Payment Processing | Finance and payments | - | - |
| Datadog | Monitoring | Cloud monitoring | - | - |
| ClickHouse | Database | Data storage and processing | - | - |
| Cloudflare | Cloud Infrastructure | Networking | - | - |
| Google Cloud Platform | Cloud Infrastructure | Cloud provider | - | - |
| PostHog | Analytics | Cloud monitoring | - | - |
| Sentry | Error Tracking | Cloud monitoring | - | - |
| Hugging Face | AI | Engineering & Development | - | - |
| Google Workspace | Productivity | Identity provider | - | - |
| Notion | Productivity | Collaboration | - | - |
| Resend | Marketing & Emails | - | - | |
| Nebius | Cloud Infrastructure | Cloud provider | - | - |
| OpenRouter | AI | Engineering | - | - |
| PlanetScale | Database | Data storage and processing | - | - |
| Slack | Communications | Collaboration | - | - |
| Tailscale | Networking | Engineering | - | - |
| Vanta | Security | Security & Compliance | - | - |
| GitHub | Developer Tools | Version control | - | - |
| Figma | Design | Product and design | - | - |
| Ashby | Recruiting | Recruiting | - | - |
| 1Password | Security | Password management | - | - |
| Verda | Cloud Infrastructure | GPU provider | Finland, EU | - |
| DocuSign | Documents | Document management | - | - |
| Linear | Productivity | Collaboration | - | - |
| Vultr | Cloud Infrastructure | Cloud provider | - | - |
| Runpod | Cloud Infrastructure | Cloud provider | - | - |
| Lambda Labs | Cloud Infrastructure | Cloud provider | - | - |
| Crusoe | AI | AI Inference Provider | - | - |
No changes recorded yet. Changes will appear here after the next scan detects updates.
Summary
29
Total Subprocessors
2
Countries
16
Categories
3%
in Finland
Subprocessors by Country
Subprocessors by Category
Biggest overlap with
Other companies using the most of the same subprocessors
Common in your industry
Top subprocessors used by other Security companies