The churn radar for B2B SaaS·Book a call·Setup in 10 minutes·Trusted by CS teams·SOC 2 · GDPR · AES-256·
The churn radar for B2B SaaS·Book a call·Setup in 10 minutes·Trusted by CS teams·SOC 2 · GDPR · AES-256·
Enterprise-grade protection

Security at FirstDistro

Your customer data deserves enterprise-grade protection. We've built security into every layer of our platform, from encryption to access controls to compliance.

SOC 2 AlignedGDPR CompliantEncrypted

Data Protection

We use multiple layers of security to protect your data at every stage.

Encryption in Transit

All data is encrypted using TLS 1.3 when transmitted between your browser, our servers, and third-party services.

Encryption at Rest

Data stored in our databases is encrypted using AES-256, the same standard used by banks and governments.

Tenant Isolation

Row-level security (RLS) ensures your data is completely isolated. No customer can ever access another customer's data.

Security Updates

We continuously monitor for vulnerabilities and apply security patches promptly. Dependencies are scanned automatically.

Infrastructure

We partner with industry-leading infrastructure providers who maintain the highest security standards.

Supabase

Database & Authentication

SOC 2 Type II

Our database infrastructure runs on Supabase, which provides enterprise-grade PostgreSQL hosting with automatic backups, point-in-time recovery, and comprehensive security controls.

Vercel

Application Hosting

SOC 2 Type II

Our application is deployed on Vercel's edge network, providing DDoS protection, automatic HTTPS, and global distribution for reliability and performance.

Data Retention

We only keep data as long as necessary to provide our service. Here are our retention periods:

Data TypeRetention Period
Product usage events90 days
Dashboard analytics30 days
Customer account dataUntil deletion requested
Aggregated health scoresUntil deletion requested

Learn more about how we handle your data in our Privacy Policy.

Access Controls

Granular permissions ensure the right people have the right level of access.

Role-Based Permissions

Three permission levels ensure appropriate access:

  • Owner — Full account access including billing, API keys, and team management
  • Admin — Manage integrations, invite team members, view billing
  • Member — Access dashboard, view customers, manage experiences

Team Management

Invite team members via email with secure, time-limited invitation tokens. Revoke access instantly when team members leave.

Scoped API Keys

API keys are scoped to your organization and can be revoked at any time. We recommend rotating keys periodically.

Subprocessors

We carefully vet all third-party services that process your data. Here are our subprocessors:

ServicePurposeCertification
SupabaseDatabase & authenticationSOC 2 Type II
StripePayment processingPCI DSS Level 1
ResendTransactional emailSOC 2
HubSpotCRM integration (optional)SOC 2 Type II
AttioCRM integration (optional)SOC 2
OpenAIAI-powered health scoringSOC 2 Type II
GoogleOAuth authenticationSOC 2 Type II

CRM integrations are only activated when you connect your CRM account. No data is shared with these services unless you explicitly enable the integration.

Compliance

We've implemented controls aligned with industry standards and regulations.

GDPR Compliant

FirstDistro acts as a data processor for customer data you collect. We provide a Data Processing Agreement (DPA) on request.

Data Portability

Export your data at any time. We support your right to data portability and will provide exports in standard formats.

Self-Service Deletion

Delete your account and all associated data directly from your settings. Deletion is permanent and immediate.

DPA Available

Enterprise customers can request a signed Data Processing Agreement. Contact us at jide@firstdistro.com.

Our Security Practices

Beyond technical controls, we maintain strong security practices:

  • Two-factor authentication enabled on all administrative accounts
  • Automated vulnerability scanning via Dependabot for all dependencies
  • Code review required for all changes before deployment
  • Audit logging for security-relevant events and permission changes
  • Limited production access restricted to essential personnel only

Security Questions?

We're happy to answer questions about our security practices, provide additional documentation, or discuss specific requirements for your organization.

Contact us for security inquiries:

jide@firstdistro.com

For general inquiries about data handling, see our Privacy Policy and Terms of Service.