Last Updated: May 06, 2026
You can download a copy of the Annex III by clicking here.
Sub-processor:
Reason for Sub-processing:
Amazon Web Services
Securely host our infrastructure, ensuring reliable data storage, processing, and availability.
Microsoft Azure
Third Party Generative AI Service - access and utilize hosted AI models.
Google Cloud Platform
Third Party Generative AI Service - access and utilize hosted AI models.
Slack
Secure team communication and collaboration, which may involve processing limited customer data for support and operational purposes.
Google Workspace
Secure email, document management, and collaboration, which may involve processing customer data for communication and operational purposes.
PagerDuty
Manage and respond to critical incidents, ensuring timely issue resolution, which may involve processing Customer Data to maintain service reliability.
SerpApi
Retrieve real-time search engine results for Customer Data analysis, enhancing the accuracy and relevance of our services.
IPInfo
Obtain geolocation and IP address based information.
DNSlytics
Gather domain and IP address intelligence for security analysis.
Spur
Identify and analyze VPNs, proxies, Tor nodes, and other anonymizing infrastructure.
Elastic
Aggregate, search and analyze logs, which often contain Customer Data, error reports and system events.
Reversing Labs
File metadata and hash values are shared to perform threat intelligence and malware analysis for detecting and preventing malicious activities.
Stytch
Identity and authentication management service.
PostHog
Product and usage analytics services.
VMRay
Providing an advanced malware sandbox and phishing threat analysis. This includes automated malware triage and analysis of samples
ScrapFly
Web scraping and screenshot capture of webpages for the analysis of phishing emails and associated links.
Parallel
Providing web intelligence and search infrastructure specifically engineered for AI agents. This capability allows our AI-driven security systems to perform high-accuracy, real-time web research.
Anthropic
Third Party Generative AI Service, used for access and use of hosted AI models.
URLScan
Used for scanning URLs for malicious content. This enhances our ability to analyze and neutralize web-based threats found within emails and other data streams.
Have I Been Pwned
Used to assess if credentials for users being investigated have been compromised. This helps quickly identify user accounts at risk following a security incident or investigation.
Datadog
Used to aggregate, search and analyze logs, which often contain Customer Data, error reports and system events.
Pylon
Used to create, process and manage support tickets, which often contain Customer Data, error reports and system events.
Snowflake
Used for ad hoc analytics and generating internal operational reports, which often contain customer data.

See for yourself how Prophet AI can supercharge your security operations, accelerating alert investigation and response
Key benefits:
Lowers MTTR with AI-driven automated alert triage & investigation
Lowers risk by prioritizing critical alerts for analyst review
Eliminates manual effort, freeing analysts to focus on high-impact security tasks