Skip to main content
Design-partner cohort open · evidence-backed accessibility operationsApply
Verassaerassa
MethodologyPricing
Sign inBook a demo
Loading…
Verassaerassa

Evidence-backed digital accessibility operations with qualified human review, careful claims, and exportable proof.

Private beta

Apply to evaluate the platform →

Platform

  • Overview
  • How it works
  • Methodology
  • Evidence packages
  • Pricing

Workflows

  • Product and engineering
  • Legal and compliance
  • Accessibility consultancies
  • Ecommerce

Trust

  • Trust Center
  • Security
  • Privacy
  • Claim boundaries

Learn

  • Docs
  • Research
  • Changelog
  • State of Web Accessibility

Company

  • About
  • Contact sales

AI-augmented accessibility evaluation. Findings accelerate audit production but do not replace qualified-reviewer attestation. No scan is a conformance guarantee.

  • Policies
  • Accessibility statement
  • Refused use cases

© 2026 Verassa. Evidence-backed accessibility operations.

Trust Center

Security

A scanner runs other people's URLs and captures their pages. That makes isolation, egress control, and encryption load-bearing, not optional.

Verassa evidence protocol

  1. Evidence

    01

    Screenshot, DOM, replay, and axe baseline captured before decisions.

  2. Judgment

    02

    Reviewer route, rationale, and owner stay attached to lower-confidence work.

  3. Verification

    03

    Re-scan records and disclaimers travel with reportable outputs.

Isolation

Every scan runs sandboxed

Every customer-supplied URL is validated for DNS resolution and private-IP denial at every redirect hop, so a scan cannot be steered at internal infrastructure (SSRF protection).

Each scan runs in a fresh, sandboxed browser process with no access to the internal network. Network egress is restricted to the customer's claimed domain. A scan cannot reach where it was not asked to go.

Encryption

Encrypted at rest and in transit

Data is encrypted at rest through managed Postgres and object-storage encryption, with database-level encryption where the schema requires it. Traffic is TLS 1.2 or higher in transit.

Authenticated-flow credentials are stored with envelope encryption in a dedicated credential vault, and are never sent to model providers. Code touching the vault requires human review before it merges.

SOC 2

Built SOC 2 ready

The platform is built to be SOC 2 ready — Type 1 first, building toward Type 2. This is a posture, not a certificate: it means change management, audit logging, encryption, access control, and incident response are designed in, not retrofitted.

Every code change is a reviewed pull request. The Decision Audit Log is append-only and tamper-evident: each row references the hash of the row before it.

Back to the Trust Center →