Security is a core principle, not an afterthought
We’re built from the ground up to protect customer data and meet the highest standards of privacy & security.


SOC2 Type II Compliant
Unthread follows industry-standard compliance frameworks guiding internal controls and processes to ensure security of customer data.

Built for the Enterprise
Get access to a special set of features that supports the needs of a modern enterprise company.

- Independent security audits
- Penetration testing
- Isolated hosted environments
- HRIS integration
- Single sign-on (SSO)
- SCIM sync
- Internal GPT integration
Privacy-First AI
Your data is your data. We don’t train our own models on your data for use with other customers. You can even bring your own AI to Unthread.


Encryption
Data is encrypted in transit and at rest with AES 256-bit encryption. Sensitive data is also encrypted with customer-specific keys that aren’t stored on our servers.

Privacy
Customer data is protected with enterprise-grade physical and network security. We never sell your data and it is always portable if you choose to leave.

Reliability
We undergo frequent pen testing in addition to internal automated testing. Our fault-tolerant infrastructure ensures that we’re always available.