Trust & Security

Naro, we prioritize the security and privacy of your data through comprehensive measures across four key areas. Our approach is designed to safeguard your information, ensuring that you can leverage our sales knowledge platform with confidence.

Tl;dr: We don’t take access to customer data lightly. We have safeguards in place to ensure it is encrypted and protected. We don’t collect anything that’s not directly related to providing value to you and we don’t store data longer than is necessary.

If you have any questions about our security measures, controls, or practices, please reach out to our team at

You can learn more about our commitment to privacy and data protection by visiting our Privacy Policy.

If you integrate Naro with Google, our use and transfer of information received from Google APIs to any other app will adhere to Google API Services User Data Policy, including the Limited Use requirements.

1. Access Control and Authentication

We enforce strict access controls and authentication measures across our systems, including unique SSH keys for production databases, and unique account credentials for application access.Multi-factor authentication (MFA) and encrypted connections are mandatory for remote access, ensuring that only authorized personnel can access sensitive information.

2. Data Protection and Privacy

All customer data is encrypted both at rest and in transit, utilizing secure protocols to protect sensitive information over public networks.We adhere to stringent data retention and disposal policies, ensuring the secure deletion of customer data in accordance with best practices and regulatory requirements.

3. Monitoring and Incident Response

Continuous monitoring through intrusion detection systems and log management tools enables early detection of potential security breaches.Our incident response policies and procedures are robust, including regular testing of our incident response plan to ensure rapid and effective response to security incidents.

4. Governance, Risk Management, and Compliance

Our security policies and practices are governed by a comprehensive risk management program, which includes regular control self-assessments and adherence to industry best practices.We maintain cybersecurity insurance and ensure that all employees and contractors understand their roles in protecting your data through mandatory security awareness training and adherence to our Code of Conduct.