Sub-processors
Service Providers who may be used to process the data of website visitors
| Hubspot | www.hubspot.com |
| OneTrust | www.onetrust.com |
| www.linkedin.com | |
| AdRoll | www.adroll.com |
| Google Ads | www.ads.google.com |
| Google Analytics | www.analytics.google.com |
| Google Recaptcha | www.google.com/recaptcha/about |
| Sendoso | www.sendoso.com |
| Syncari | www.syncari.com |
| 6Sense | www.6sense.com |
| Unbounce | www.unbounce.com |
| Jazz HR | www.jazzhr.com |
| Cloudways | www.cloudways.com |
| Kinsta | www.kinsta.com |
| Semrush | www.semrush.com |
Note: please also see cookie information which can be accessed using the “Cookies Preference” link on the footer of https://www.verimatrix.com/
Service Providers who may be used to process the data of customers, prospective customers and business partners
| Hubspot | www.hubspot.com |
| OneTrust | www.onetrust.com |
| www.linkedin.com | |
| AdRoll | www.adroll.com |
| Google Ads | www.ads.google.com |
| Google Recaptcha | www.google.com/recaptcha/about |
| Google Analytics | www.analytics.google.com |
| Sendoso | www.sendoso.com |
| Zendesk | www.zendesk.com |
| Amazon Web Services | www.aws.amazon.com |
| Stripe | www.stripe.com |
| Salesforce | www.salesforce.com |
| Boomi | www.boomi.com |
| Syncari | www.syncari.com |
| Docusign | www.docusign.com |
| Grafana Labs | www.grafana.com |
| Clari | www.clari.com |
| Loopio | www.loopio.com |
| Zuora | www.zuora.com |
| Anthropic | www.anthropic.com |
| Open AI | www.openai.com |
Service Providers who may be used as sub-processors to assist Verimatrix with data processing as part of the service provided to customers
| Amazon Web Services | www.aws.amazon.com |
| Snowflake | www.snowflake.com |
| Looker | www.looker.com |
| Grafana | www.grafana.com |
| Elasticsearch (including Kabana) | www.elastic.co |
| Zendesk | www.zendesk.com |
| Streamsets | www.streamsets.com |
| OpsGenie | www.opsgenie.com |
| Pager Duty | www.pagerduty.com |
| FluentD | www.fluentd.org |
Note: From time to time, Verimatrix may use contract resources to provide technical support and system administration services. Such contract resources will be subject to appropriate confidentiality and data processing obligations.