
We provide enterprise-grade protection.
Your clients trust you with their most sensitive information. We take that just as seriously as you do.
AES-256 Encryption
All data encrypted in transit (TLS 1.2+) and at rest (AES-256). Bank-grade encryption, no exceptions.
AES-256 Encryption
All data encrypted in transit (TLS 1.2+) and at rest (AES-256). Bank-grade encryption, no exceptions.
SOC 2 Certified
Independently audited security controls, data handling, and infrastructure - verified to enterprise standards.
SOC 2 Certified
Independently audited security controls, data handling, and infrastructure - verified to enterprise standards.
No AI Training on Your Data
Your firm’s data is never used totrain any AI model. Written into every agreement we sign.
No AI Training on Your Data
Your firm’s data is never used totrain any AI model. Written into every agreement we sign.
Rolling Data Deletion
Raw activity data is automatically and permanently purged on a rolling cycle.
Rolling Data Deletion
Raw activity data is automatically and permanently purged on a rolling cycle.
SSO & Managed Access Control
SAML 2.0 and SCIM provisioning through your IDP. Centralized access control, automated onboarding/offboarding.
SSO & Managed Access Control
SAML 2.0 and SCIM provisioning through your IDP. Centralized access control, automated onboarding/offboarding.
SSO & Managed Access Control
SAML 2.0 and SCIM provisioning through your IDP. Centralized access control, automated onboarding/offboarding.
Instant Pause - You’re in Control
One click stops all tracking immediately. Personal time is personal - Ajax captures nothing until you choose to resume.
Instant Pause - You’re in Control
One click stops all tracking immediately. Personal time is personal - Ajax captures nothing until you choose to resume.
Instant Pause - You’re in Control
One click stops all tracking immediately. Personal time is personal - Ajax captures nothing until you choose to resume.
Common questions
What happens to my data?
Security is our highest priority. We know that you deal with privileged client data for a living, and we take that seriously. We do not train models on your data or engage with vendors that train on your data. We do not store your data or engage with vendors that store your data. It is deleted automatically on a rolling basis. We are SOC 2 certified.
What happens to my data?
Security is our highest priority. We know that you deal with privileged client data for a living, and we take that seriously. We do not train models on your data or engage with vendors that train on your data. We do not store your data or engage with vendors that store your data. It is deleted automatically on a rolling basis. We are SOC 2 certified.
Can my firm see what I’m doing?
No. Ajax is for you - to save you time and find you more billables. We are not a tool to let your firm spy on you, and we never will be. Your Ajax hours are only visible to you, and you alone decide whether to release them to your billing system.
Can my firm see what I’m doing?
No. Ajax is for you - to save you time and find you more billables. We are not a tool to let your firm spy on you, and we never will be. Your Ajax hours are only visible to you, and you alone decide whether to release them to your billing system.
Does Ajax see anything else on my phone?
Ajax integrates with your work email, Teams or Slack, and supported VoIP systems (internet-based calling platforms like RingCentral, Dialpad, or VXT). If that work happens on your phone, Ajax can track it through those integrations, but it cannot see anything else on your phone.
Does Ajax see anything else on my phone?
Ajax integrates with your work email, Teams or Slack, and supported VoIP systems (internet-based calling platforms like RingCentral, Dialpad, or VXT). If that work happens on your phone, Ajax can track it through those integrations, but it cannot see anything else on your phone.

