The Neuroscale third-party inventory. Implements the inventory requirement of the Third-Party Management Policy and the onboarding step in Vendor Risk Assessment.
Operational mirror: the live, integration-driven inventory is in Vanta (with continuous monitoring and SOC 2 evidence). This page is the human-readable, authoritative listing referenced from policies — it is updated each time a vendor is onboarded, retiered, or offboarded, and reconciled against Vanta during the quarterly vendor review.

Tiering

Tiers are assigned by Security at intake (see Vendor Risk Assessment).
TierDefinitionRe-review
HighProcesses Confidential or customer data; integrates with production; or has access to production credentials.Annually
MediumProcesses some personal data or provides material business-critical service without direct production access.Every 2 years
LowPublic information only; no production access; no Confidential or personal data.At contract renewal

Current inventory

VendorTierScope / dataOwnerPublic sub-processor?
Amazon Web Services (AWS)HighPrimary cloud — compute, storage (S3), KMS, secrets; majority of customer data. AWS Textract used for optical character recognition of submitted documents.CTOYes — see Sub-processor List
VultrHighSecondary cloud — Vultr Cloud Compute, Vultr Bare Metal, Vultr Object Storage, Vultr Kubernetes Engine (VKE) where applicable. Hosts a portion of production compute and database workloads alongside AWS.CTOYes — see Sub-processor List
Microsoft 365 (Outlook, SharePoint, OneDrive)HighWorkforce email, document store, internal records.CISONo
RipplingHighIdP / SSO, MDM, EDR, HRIS — workforce identity and personnel records.CISONo
GitHub (incl. Advanced Security, Dependabot, Actions)HighSource code, continuous-integration and continuous-delivery pipelines, build artifacts, and vulnerability findings.CTONo
LinearMediumIssue tracking, intake-form destinations.CTONo
Better StackMediumLogs, uptime, on-call paging.CISONo
VantaMediumCompliance automation, control evidence, vendor inventory mirror.CISONo
DashlaneMediumWorkforce password manager.CISOYes — see Sub-processor List
HashiCorp Vault (self-hosted on Vultr)HighCross-cloud secrets-of-record for production — static secrets, dynamic secrets (DB / cloud-IAM credentials), PKI, Transit-engine application-layer encryption keys. Workload auth via Vault AWS / Kubernetes / AppRole / OIDC methods. Runs on Vultr Cloud Compute / VKE; HashiCorp is a software vendor only (Vault OSS / Enterprise license), not a sub-processor.CTO + CISONo — self-hosted on Vultr (already listed). HashiCorp’s role is software-licensor only.
CheckrMediumPre-employment background screening (CRA).CHRONo
HubSpotMediumCRM, marketing, sales pipeline.CEO / GTMNo
SnykMediumSCA / dependency scanning.CTONo
Aqua Security TrivyLowContainer, infrastructure-as-code, secret, misconfiguration, and license scanning. Open-source and self-hosted.CTONo
DetectifyMediumExternal vulnerability scanning.CISONo
VGC LLPMediumOutside General Counsel.CEONo
Iron MountainMediumDestruction — paper, magnetic media, e-waste. NAID AAA Certified.CISONo
Shred-itLowDestruction — paper, secure-shred bins. NAID AAA Certified.CISONo
Anthropic (Claude API / Enterprise)HighThird-party AI model provider — used in customer-facing product features and for internal tooling. Listed on the Sub-processor List.CTO + CISO + GCYes
OpenAI (ChatGPT Enterprise / API)HighThird-party AI model provider — used in customer-facing product features and for internal tooling. Listed on the Sub-processor List.CTO + CISO + GCYes
xAI (Grok API / Enterprise)HighThird-party AI model provider — used in customer-facing product features and for internal tooling. Listed on the Sub-processor List.CTO + CISO + GCYes
Cerebras (cerebras.ai inference)HighThird-party AI inference provider — used in customer-facing product features and for internal tooling. Listed on the Sub-processor List.CTO + CISO + GCYes
Portkey AIHighLLM-gateway service operated between Neuroscale services and upstream AI model providers. Customer prompts and model outputs transit the gateway.CTO + CISO + GCYes — see Sub-processor List
WorkOSHighAuthentication, single sign-on, and organization and membership management for the customer-facing services.CISOYes — see Sub-processor List
ResendHighTransactional email delivery for product and operational notifications. Processes recipient email addresses and message content.CTO + CISOYes — see Sub-processor List
Discord (webhooks)LowInternal operational alerting only. Workforce-only; no Customer Personal Data is transmitted.CISONo
Temporal CloudHighBackground workflow orchestration. Workflow payloads may include Customer Personal Data.CTO + CISOYes — see Sub-processor List
VercelHighFrontend hosting and edge runtime for the customer-facing services.CTOYes — see Sub-processor List
CloudflareHighCloudflare One (Gateway, Access, WARP) for workforce networking and Zero Trust access control; Cloudflare Tunnel for ingress to deployed services.CISO + CTOYes — see Sub-processor List
People Data LabsHighPerson-profile enrichment used in customer-facing product features.CTO + GCYes — see Sub-processor List
RocketReachHighContact-discovery lookups used in customer-facing product features.CTO + GCYes — see Sub-processor List
KickboxMediumEmail-address deliverability validation.CTOYes — see Sub-processor List
NumVerify (APILayer)MediumPhone-number validation and carrier lookup.CTOYes — see Sub-processor List
FireCrawlMediumRetrieval of public-web content in support of product import features. No Customer Personal Data is transmitted to FireCrawl.CTONo
Logo.devLowCompany-logo lookup by domain. No Personal Data or Customer Personal Data is transmitted.CTONo
Bright DataLowResidential-proxy network used for collection of public-web content. No Customer Personal Data is transmitted.CTONo
The inventory is reconciled against Vanta and the Sub-processor List quarterly. New vendors are added at intake; removed vendors are retained in the inventory’s archive view for six years per the Records Retention Schedule.

Documentation kept on file (per vendor)

See Vendor Risk Assessment → Documentation kept on file.

Cross-references

Version history

VersionDateDescriptionAuthorApproved by
1.0May 8, 2026Initial versionCameron WolfeIshan Jadhwani