Legal

Sub-Processors

PILLAR uses the following third-party service providers ("sub-processors") to deliver the service. This list is maintained as part of our Data Processing Agreement obligations. Customers are notified of material changes to this list.

Infrastructure & Hosting

Sub-ProcessorPurposeData ProcessedLocationCertifications
Supabase, Inc.
(via AWS)
Primary database, authentication, row-level security All customer data: accounts, contacts, opportunities, scores, credentials (encrypted) US East (Virginia) SOC 2 Type II
Vercel, Inc. Application hosting, serverless functions, edge network Application requests, session data, server-side rendering US (multi-region) SOC 2 Type II
Cloudflare, Inc. Marketing site hosting, CDN, DDoS protection Static marketing content only. No customer data. Global SOC 2 Type II ISO 27001

Transactional Services

Sub-ProcessorPurposeData ProcessedLocationCertifications
Resend, Inc. Transactional email (notifications, alerts, daily digests) Recipient email addresses, email content (account names, score summaries) US SOC 2 Type II

Monitoring & Analytics

Sub-ProcessorPurposeData ProcessedLocationCertifications
Sentry (Functional Software, Inc.) Error monitoring and application performance Error stack traces, request metadata. May incidentally include account names or IDs in error context. No credentials or PII by design. US SOC 2 Type II
PostHog, Inc. Product analytics (feature usage, user flows within PILLAR) User interactions within the PILLAR application. Identified by user email for authenticated users. US SOC 2 Type II
Google LLC
(Google Analytics)
Marketing site analytics Anonymous page views on pillargtm.com only. No customer data. US SOC 2 Type II ISO 27001

Source Code & Development

Sub-ProcessorPurposeData ProcessedLocationCertifications
GitHub (Microsoft) Source code repository (private) Application source code only. No customer data stored in repositories. US SOC 2 Type II

Customer-Initiated Integrations

The following services are connected by the customer during onboarding. PILLAR acts as a data processor when reading from these sources. Data flows from the customer's instance of these services into PILLAR's database. PILLAR does not write to these services except for CRM score writeback (health, risk, and priority scores written to customer-controlled fields).

IntegrationDirectionData ProcessedAuth Method
SalesforceRead + Score WritebackAccounts, contacts, opportunities, leadsOAuth 2.0
HubSpotRead + Score WritebackCompanies, contacts, dealsOAuth 2.0
Microsoft Dynamics 365Read + Score WritebackAccounts, contacts, opportunities, leads, casesOAuth 2.0
Microsoft 365 (Outlook)Read onlyEmail headers/snippets, calendar events (no full bodies)OAuth 2.0
Microsoft TeamsOutbound notifications onlySignal alerts and digest cards sent to customer-configured channels. No customer data read.OAuth 2.0 / Webhook
Google WorkspaceRead onlyEmail headers/snippets, calendar events (no full bodies)OAuth 2.0
IntercomRead onlyConversations, tickets, CSAT, contacts, companiesAccess Token / OAuth
ZendeskRead onlyTickets, SLA metrics, CSAT scoresAPI Token
FreshdeskRead onlyTickets, customer satisfaction dataAPI Key
Wootric (InMoment)Read onlyNPS survey responsesClient Credentials
DelightedRead onlyNPS/CSAT survey responsesAPI Key
PendoRead onlyFeature adoption, visitor sessionsAPI Key
MixpanelRead onlyEvents, funnels, cohort retentionAPI Key + Secret
AmplitudeRead onlyBehavioral events, user journeysAPI Key + Secret
SegmentRead onlyCDP events forwarded from customer's productAPI Token
HeapRead onlyAuto-captured product analyticsAPI Key
Mode AnalyticsRead onlyBI report output (product usage snapshots)API Key + Secret
Starbridge.aiRead only (webhook)K-12 district intelligence signalsHMAC Webhook

Customers choose which integrations to connect. No integration is required. PILLAR only accesses data from services the customer explicitly authorizes.

Change notification: PILLAR will notify customers at least 30 days before adding a new sub-processor that processes customer data. Customers may object to the addition of a new sub-processor by contacting security@pillargtm.com within the notification period.

Last updated: April 2026

Weekly Blueprint
Join The Architects - our weekly newsletter for EdTech and public sector revenue leaders
Subscribe →