Security and privacy, built into Catch
Catch is designed to handle sensitive communications, scheduling, and personal data with the same level of care expected from a trusted executive assistant.
Every action is permission-based and fully under your control.
Start with a 7-day free trial. Cancel anytime.
Security and privacy, built into Catch
Catch is designed to handle sensitive communications, scheduling, and personal data with the same level of care expected from a trusted executive assistant.
Every action is permission-based and fully under your control.
Start with a 7-day free trial. Cancel anytime.
Compliance and independent audits
Catch is built to meet the highest standards of security and data protection.
Our systems and processes have been independently audited and verified through industry-leading certification programs.
SOC 2 Type II Compliant
Google Verified
CASA Tier-2 Certified
Zoom Certified
Slack (Coming Soon)
Compliance and independent audits
Catch is built to meet the highest standards of security and data protection.
Our systems and processes have been independently audited and verified through industry-leading certification programs.
SOC 2 Type II Compliant
Google Verified
CASA Tier-2 Certified
Zoom Certified
Slack (Coming Soon)
Secure infrastructure by design
Catch runs on modern cloud infrastructure with multiple layers of security, encryption, and monitoring to protect user data.
Infrastructure Security
All internal systems are protected by strong authentication using single sign-on.
Sensitive credentials and API keys are securely stored using AWS Secrets Manager.
Infrastructure access is tightly controlled and monitored.
Encryption
All data is encrypted both in transit and at rest.
Databases and object storage use AES-256 encryption.
Encryption keys are securely managed and rotated using AWS Key Management Services.
Reliability and Resilience
Our systems are continuously monitored for unusual activity, intrusion attempts, and abnormal API usage.
Automated alerting and anomaly detection allow rapid response to potential threats.
Infrastructure is designed for resilience and recovery.
Secure infrastructure by design
Catch runs on modern cloud infrastructure with multiple layers of security, encryption, and monitoring to protect user data.
Infrastructure Security
All internal systems are protected by strong authentication using single sign-on.
Sensitive credentials and API keys are securely stored using AWS Secrets Manager.
Infrastructure access is tightly controlled and monitored.
Encryption
All data is encrypted both in transit and at rest.
Databases and object storage use AES-256 encryption.
Encryption keys are securely managed and rotated using AWS Key Management Services.
Reliability and Resilience
Our systems are continuously monitored for unusual activity, intrusion attempts, and abnormal API usage.
Automated alerting and anomaly detection allow rapid response to potential threats.
Infrastructure is designed for resilience and recovery.
You stay in control of your data
Catch only accesses the information required to perform tasks on your behalf, and always within the permissions you grant.
You remain in full control of what Catch can access and what actions it can take.
customer control
- Catch never performs actions outside the permissions you grant.
- Users can review and adjust access settings whenever they choose.
Retention and Deletion
- Data is retained only as long as necessary to support workflows.
- Users may revoke access or request deletion at any time.
Limited Data Use
- Data is retained only as long as necessary to support workflows.
- Users may revoke access or request deletion at any time.
Scoped Permissions
- Catch typically requires access to email and calendar to coordinate scheduling and communication.
- Additional permissions can be granted or revoked at any time.
You stay in control of your data
Catch only accesses the information required to perform tasks on your behalf, and always within the permissions you grant.
You remain in full control of what Catch can access and what actions it can take.
Customer
Control
- Catch never performs actions outside the permissions you grant.
- Users can review and adjust access settings whenever they choose.
Retention
and Deletion
Limited
Data Use
Scoped
Permissions
Frequently asked questions
Does Catch send emails automatically?
Is my data used by third-party AI providers?
What permissions does Catch require?
Can I revoke access at any time?
How can I access the full security report?
Frequently asked questions
Does Catch send emails automatically?
Is my data used by third-party AI providers?
What permissions does Catch require?
Can I revoke access at any time?
How can I access the full security report?
Our full security documentation and audit reports are available upon request.
View Our Full Trust Documentation
Our full security documentation and
audit reports are available upon request.
Hire your admin for $99/month
Catch is ready when you are, an assistant that's up and running before your next meeting.
What Catch Takes Care Of
Hire your admin for $99/month
$99/month. Billed monthly.
Cancel anytime. Start with a 7-day free trial.