Our customers trust Palm with sensitive business and identity data. Securing that data — and the systems that process it — is foundational to our product and our business. This page describes how we approach that responsibility.
For deeper documentation, certification artifacts, and the latest compliance reports, request access by emailing security@getpalm.com
Governance
Palm's Security and Privacy teams establish policies and controls, monitor compliance, and prove our security posture to third-party auditors. The program is reviewed annually and built on a small set of principles that show up in every system we build:
Data protection
Product security
We continuously scan our code, dependencies, containers, and infrastructure for vulnerabilities:
We engage an independent third party to perform a penetration test at least annually. Findings are remediated against documented SLAs.
Security researchers and customers can report suspected vulnerabilities to security@getpalm.com. We acknowledge reports promptly and coordinate disclosure responsibly.
Infrastructure security
Palm runs on Amazon Web Services (AWS). We rely on AWS's compliance posture (SOC 2, ISO 27001, and others) for the underlying physical and environmental controls of our data center facilities.
Production infrastructure produces detailed logs for user activity, security-relevant events, and system faults. Logs are centralized, retained, and reviewed both manually and by automated alerting.
Real-time service availability is published at status.getpalm.com
Enterprise security
We maintain an inventory of vendors and assess them based on the type of data they access and the criticality of the services they provide. Critical vendors' compliance reports (such as SOC 2) are reviewed at least annually.
Data privacy
We process personal data in accordance with our Privacy Policy and applicable privacy and data protection laws.
A list of subprocessors is available below and updated as the list changes.
Subprocessors
Palm relies on the following subprocessors for production services that handle customer data. Each is contractually obligated to apply security and privacy protections consistent with our own.
| Subprocessor | Purpose | Region |
|---|---|---|
| Amazon Web Services (AWS) | Cloud infrastructure, compute, storage, networking; customer data store | United States |
| Front | Customer support ticketing | United States |
| JustCall | Customer support phone conversations | United States |
| Elastic | Security event and log storage | United States |
For a full list of categories of third parties Palm engages — including website analytics, advertising, and visitor identification providers — see our Privacy Policy.
Customers will be notified of material changes to this list.
Incident response
We maintain a documented Incident Response Plan that defines roles, severity levels, and procedures for detecting, containing, eradicating, and recovering from security incidents. The plan is tested at least annually.
In the event of a security incident affecting customer data, we will notify affected customers without undue delay, in accordance with applicable law and our contractual commitments.
To report a suspected incident: security@getpalm.com.
Contact
For security, privacy, and compliance inquiries, use the appropriate channel below.
Last updated: 2026-05-05.