Security at Attention

Attention utilizes enterprise-grade best practices to ensure our customer’s security.

Thank you! Get ready to crush your quota!
Something went wrong. Please enter your work email.

At Attention, customer trust is our top priority

We maintain the highest standards of data privacy and security because we know your data is important to keep secure.

lock icon

Data Encryption

Data is encrypted in-transit using TLS 1.2 and TLS 1.3. Data is encrypted at-rest, using the latest cipher-suites recommendations.

Retain

Data Permissions & Authentication

Access to customer data is limited to authorized employees who require it for their job and data access is logged.

digital lock
soc 2 type 2

SOC 2 Type II Compliant

Attention is SOC2 Type II compliant. Attention has been audited by an independent firm who has confirmed that Attention meets the requirements set forth in TSP section 100, 2017 Trust Services Criteria for Security, Confidentiality, and Availability.

Attention works with industry leading security firms to perform annual network and application layer penetration tests
Security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data
Attention utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle
Attention employs staff responsible for reviewing, updating, testing and maintaining our security and privacy policy.

Our Features

battlecard icon

Real-time battlecards

Know exactly what to say and improve the outcome of your conversations, every single time.

Live talktracks

Our AI tracks the engagement of your prospects in real time and helps you increase it immediately.

trophy icon

Build confidence and competence

Our AI builds your confidence and competence to close more deals.

Track progress

Track your progress over time. Understand how you're becoming a super seller in a matter of weeks, not months.