Compliance & Governance
Immutable audit trails, exportable compliance evidence, and configurable security policies that map to your regulatory requirements.

Key Features
Audit Export Formats
Export compliance evidence in the format your assessors expect โ CSV and JSON for general reporting, CEF and LEEF for security platforms, or OCSF for the Open Cybersecurity Schema Framework.
Credential Compliance Reporting
Know the security posture of every credential in your organization. See which users have compliant passkeys, which need re-enrollment, and your overall credential coverage at a glance.
Data Governance
Configurable data retention policies, user data export for subject access requests, and event redaction capabilities. Built for organizations that need to demonstrate GDPR and data sovereignty compliance.
Configurable Security Settings
Set security requirements at the organization level โ allowed authenticator types, biometric requirements, device policies, and attestation requirements. Your security posture, your rules.
Why This Is Better Without Passwords
Password compliance is a treadmill โ 90-day rotation policies, complexity rules, breach database monitoring, password history enforcement. None of it prevents phishing. Passkey-based authentication meets phishing-resistant MFA requirements by default. You don't need policy layers to compensate for a fundamentally weak authentication method. Walk into an audit with evidence that your entire workforce authenticates with phishing-resistant, biometric-verified credentials.
Ready to Replace Your Password Layer?
Start a 30-day free trial. Set up passwordless authentication for your team in minutes. No credit card required.