Built to be trusted with your most sensitive data.
Hiring data is some of the most personal data in your company. Grow's security program is designed around that responsibility from day one — not bolted on for procurement.
Audited annually by an independent firm.
Information security management certified.
DPA and SCCs available on request.
Honors consumer rights for California residents.
AES-256 at rest, TLS 1.3 in transit, customer-managed keys available on Enterprise plans.
Logical isolation by default, dedicated infrastructure for regulated industries.
SAML 2.0, OIDC and SCIM 2.0 included on Business and Enterprise. Enforce MFA org-wide.
Model providers are bound by zero-retention agreements. Prompts never train shared models.
Immutable audit trail of every read, write and admin action — exportable via API.
Continuous scanning, quarterly third-party penetration tests, public bug bounty.
Reporting a vulnerability
Found something? Email security@grow.example with reproduction steps. We acknowledge reports within one business day and reward valid findings through our bug bounty program.
Hire your next 10 people with one platform.
Start a 14-day trial. No credit card. Cancel anytime.