The best relationships are long-term. This is why we have devised several tiers of support for our products.
Under any of the following support tiers, we are here to help you. Anytime you need us. From time to time, we’ll be coming back for health checks anyway.
We communicate in cryptography, code, and human language to make sure that your experience of using our tools is as smooth as possible. Whether it’s one of our products, a custom solution, piece of code, or security architecture design — we are happy to provide ongoing support and oversight for them as these deliverables evolve and require improvements over time.
If you require a non-standard solution, we’ll also gladly enter a custom contract to support your business in a way that works best for you.
Multiple support tiers to fit your needs
You’re entitled to product-level support that extends our basic obligations upon license purchase for our products. We can help you with configuring, performance tuning, or custom features.
Several health checks for our product(s) a year 1.
Pre-allocated time specifically dedicated to bug fixes / feature requests.
Whenever we work together on a custom solution, we can keep a detailed record of the processes and resume our assistance any time it’s necessary, picking up right where we left off.
We offer partnership-like strategic support and continuous cooperation for fast-paced companies with ambitious goals and sophisticated security problems.
Periodic health checks for a jointly crafted solution during a year 1.
Several on-demand security verifications 2.
High-priority feature requests for any products involved in the solution 3.
40 hours of pre-allocated engineering time for any requests outside the scope of bug fixes / feature requests.
1. Health check is a practice of ensuring that the developed solution works as expected and preserves its security properties. Health check schedules are assigned depending on the product development velocity.
2. Security verification is more of an in-depth verification of the security subsystem, its current security posture, and advice regarding corrections.
3. Feature request completion depends on the team load and current roadmap. We take all feature requests seriously but only some get special treatment.