Sub-processors

Last updated: March 2025

The following sub-processors assist Heist in processing Customer Data as described in the Data Processing Agreement. Customer Data includes user account data (name, email, workspace membership), test account credentials, session tokens, and application interaction logs generated during security testing, as further described in Annex I of the DPA. For how Heist handles personal data incidentally encountered during testing, see DPA Section 1.5.2.

Customer Data, including findings, test results, user accounts, credentials, and session data, is processed and stored exclusively within the European Union. Transactional email delivery is handled by a US-based provider. These transfers are governed by EU Standard Contractual Clauses. Email content is retained for up to 45 days.

Company

Registration

Address

Services

Processing location

Google Cloud EMEA Limited

CRO 660412 (Ireland)

70 Sir John Rogerson's Quay, Dublin D02 R296, Ireland

Cloud infrastructure hosting and compute

European Union

Supabase Pte. Ltd.

UEN 202005760H (Singapore)

65 Chulia Street, #38-02/03 OCBC Centre, Singapore 049513

Database hosting, user authentication, and workspace management

European Union

Microsoft Ireland Operations Limited

CRO 256796 (Ireland)

70 Sir John Rogerson's Quay, Dublin D02 R296, Ireland

AI model hosting and inference

European Union

Langfuse GmbH

HRB 248821 B, Amtsgericht Charlottenburg (Germany)

Gethsemanestr. 4, 10437 Berlin, Germany

AI pipeline monitoring and observability

European Union

Temporal Technologies, Inc.

LEI 254900HPH40MMDHN3541 (Delaware, USA)

1209 Orange St, Wilmington, DE 19801, USA

Workflow orchestration

European Union

PostHog, Inc.

EIN 35-2678319 (Delaware, USA)

2261 Market Street #4008, San Francisco, CA 94114, USA

Error logging and product analytics

European Union

ActiveCampaign, LLC (Postmark)

EIN 20-0215482 (Delaware, USA)

1 North Dearborn St, 5th Floor, Chicago, IL 60602, USA

Transactional email delivery

United States

Changes to this list

During the current pre-launch period, Heist may update this list at its discretion (see DPA Section 2.2.1). Once the Service reaches general availability, Heist will notify customers at least 30 days before engaging a new sub-processor or making a material change to an existing sub-processor's scope (see DPA Section 2.2.2).

Get ahead of your vulnerabilities. Run your pentests with Heist.

Get ahead of your vulnerabilities. Run your pentests with Heist.

Get ahead of your vulnerabilities. Run your pentests with Heist.