Update to Subprocessor List - 012126
Update (21 January 2026): We have updated our Subprocessor List. Please visit the Legal section below for details.
Update to Subprocessor List - 011626
Update (16 January 2026): We have updated our Subprocessor List. Please visit the Legal section below for details.
Critical n8n Vulnerability (CVE-2026-21858)
AlphaSense is aware of a maximum-severity security flaw in n8n, a popular workflow automation platform, that allows an unauthenticated remote attacker to gain complete control over susceptible instances.
Based on the information currently available from n8n, we can confirm that AlphaSense does not use this and is not affected by this incident.
We will post updates here as n8n completes their investigation and shares further findings.
Update to Subprocessor List - 122025
Update (20 December 2025): We have updated our Subprocessor List. Please visit the Legal section below for details.
Update to Subprocessor List - 121725
Update (17 December 2025): We have updated our Subprocessor List. Please visit the Legal section below for details.
Documents
Access Control
Access Control
Access is tightly monitored and controlled at our company. We are happy to provide more details about our access control practices upon request.
Asset Management
Asset Management
We have strict asset management policies in place to ensure that all assets are accounted for and secure.
Change Management
Change Management
We have a change and configuration management process in place to ensure that changes are properly reviewed and approved.
Data Privacy
Data Privacy
Privacy of customer data is top of mind. We follow industry best practices and follow all applicable privacy regulations.
Endpoint Security
Endpoint Security
We follow industry best practices for endpoint security. We are happy to provide more details about our endpoint security practices upon request.
Infrastructure
Infrastructure
We take great care to work with best-in-class infrastructure providers that provide secure computing and storage. We are happy to provide more details about our infrastructure upon request.
Network Security
Network Security
We protect our corporate network against external & internal threats.
Physical & Environment
Physical & Environment
We have physical and environmental controls in place to ensure that our data centers are secure and reliable.
Risk Management
Risk Management
We have a dedicated team that manages security risks. We are happy to provide more details about our risk management practices upon request.


