Skip to content

Sub Processors

October 21, 2024

Entity NameFunctionCorporate Location
Amazon Web Services, Inc.InfrastructureUnited States of America
Google LLCCustomer SupportUnited States of America
Salesforce.com, Inc.Customer SupportUnited States of America
SalesLoftSales OperationsUnited States of America
ChurnZeroCustomer Relationship ManagementUnited States of America
Hubspot, Inc.Customer SupportUnited States of America
Segment.io, Inc.Event ProcessingUnited States of America
LinkedIn CorporationCustomer MarketingUnited States of America
Gong I.O. LtdCustomer IntelligenceUnited States of America
CoefficientEvent ProcessingUnited States of America
SaaSOpticsFinancial Records United States of America
SlackCustomer SupportUnited States of America
DatabricksCustomer IntelligenceUnited States of America
ZapierEvent ProcessingUnited States of America
TableauCustomer IntelligenceUnited States of America
ZoomCustomer SupportUnited States of America
PendoProduct AnalyticsUnited States of America
LaceworkInfrastructure SecurityUnited States of America
DoControlAccess ManagementUnited States of America
AtlassianCustomer SupportUnited States of America
SendGridEmail SystemUnited States of America
TwilioCustomer SupportUnited States of America
NotionCustomer SupportUnited States of America
6senseCustomer & Sales AnalyticsUnited States of America
ZendeskCustomer SupportUnited States of America
OpenAIKnowledge Base Processing United States of America
CalendlyCustomer Support and SchedulingUnited States of America
UserGemsSales Lead SourcingUnited States of America
SweethawkCustomer Satisfaction AnalyticsUnited States of America
DomoData AnalyticsUnited States of America
VidyardVideo Creation & DistributionUnited States of America
RevOps.ioDeal & Contract ManagementUnited States of America

Get started today

See it in Action!

Schedule a demo today and find out how Whistic’s dual-sided platform can transform your third-party risk assessment process.

Get a Demo

Get Started for Free

Set up your Whistic Basic Profile! In a few short steps, you can centralize all your security documentation, control access, publish and share.

Start Your Profile