Built for trust,

from day one.

Built for trust,

from day one.

Lyra is independently audited (SOC 2 Type I & II) and continuously monitored to protect your data, your customers, and your reputation.

Enterprise-grade security

Peace of mind, built-in. Lira applies industry-standard controls across our product and infrastructure.

SOC 2 compliance

Lyra has undergone a Service Organization Controls audit (SOC 2 Type II).

SOC 2 compliance

Lyra has undergone a Service Organization Controls audit (SOC 2 Type II).

SOC 2 compliance

Lyra has undergone a Service Organization Controls audit (SOC 2 Type II).

HIPAA compliance

Privacy and security measures to ensure that Protected Health Information (PHI) is appropriately safeguarded.

HIPAA compliance

Privacy and security measures to ensure that Protected Health Information (PHI) is appropriately safeguarded.

HIPAA compliance

Privacy and security measures to ensure that Protected Health Information (PHI) is appropriately safeguarded.

GDPR compliance

Committed to compliance with Europe’s General Data Protection Regulation (GDPR).

GDPR compliance

Committed to compliance with Europe’s General Data Protection Regulation (GDPR).

GDPR compliance

Committed to compliance with Europe’s General Data Protection Regulation (GDPR).

Admin controls

Restrict access to system-level privileges.

Admin controls

Restrict access to system-level privileges.

Admin controls

Restrict access to system-level privileges.

Audit logs

Audit logs automatically keep track of important workspace events over the last 3 months.

Audit logs

Audit logs automatically keep track of important workspace events over the last 3 months.

Audit logs

Audit logs automatically keep track of important workspace events over the last 3 months.

App approvals

Control which third-party applications have access to your Lyra workspace.

App approvals

Control which third-party applications have access to your Lyra workspace.

App approvals

Control which third-party applications have access to your Lyra workspace.

Identity management

Strong access controls powered by industry-standard identity.

Single sign-on (SSO)

Authenticate into Lyra using Google SSO or login via email with email codes.

Single sign-on (SSO)

Authenticate into Lyra using Google SSO or login via email with email codes.

Single sign-on (SSO)

Authenticate into Lyra using Google SSO or login via email with email codes.

Passkeys

Secure and fast login without having to rely on passwords.

Passkeys

Secure and fast login without having to rely on passwords.

Passkeys

Secure and fast login without having to rely on passwords.

SAML

Lyra offers SAML via most identity providers (Okta, OneLogin, LastPass, Auth0, Bitium, and more).

SAML

Lyra offers SAML via most identity providers (Okta, OneLogin, LastPass, Auth0, Bitium, and more).

SAML

Lyra offers SAML via most identity providers (Okta, OneLogin, LastPass, Auth0, Bitium, and more).

SCIM

Provision and deprovision users in Lyra through your identity provider.

SCIM

Provision and deprovision users in Lyra through your identity provider.

SCIM

Provision and deprovision users in Lyra through your identity provider.

Domain claiming

Add an extra layer of security and keep your teammates in the right workspace.

Domain claiming

Add an extra layer of security and keep your teammates in the right workspace.

Domain claiming

Add an extra layer of security and keep your teammates in the right workspace.

Login restrictions

Restrict login to specific methods for added security (Google SSO or email logins).

Login restrictions

Restrict login to specific methods for added security (Google SSO or email logins).

Login restrictions

Restrict login to specific methods for added security (Google SSO or email logins).

IP restrictions

Restrict workspace access to your private network.

IP restrictions

Restrict workspace access to your private network.

IP restrictions

Restrict workspace access to your private network.

Privacy

Your data stays yours. We collect only what’s needed to provide the service and protect it accordingly.

Private lyras

Create private lyras for work that should only be accessed by certain workspace members.

Private lyras

Create private lyras for work that should only be accessed by certain workspace members.

Private lyras

Create private lyras for work that should only be accessed by certain workspace members.

Data encryption

Lyra forces HTTPS on all connections and encrypts data in-transit with TLS 1.2. All data at-rest is secured using AES 256-bit encryption.

Data encryption

Lyra forces HTTPS on all connections and encrypts data in-transit with TLS 1.2. All data at-rest is secured using AES 256-bit encryption.

Data encryption

Lyra forces HTTPS on all connections and encrypts data in-transit with TLS 1.2. All data at-rest is secured using AES 256-bit encryption.

Ready to take meetings
to the next level?

What we’ll cover

Automatic notes and follow-ups from every call

How Lyra saves teams hours each week

Quick demo of the platform

Ready to take meetings
to the next level?

What we’ll cover

Automatic notes and follow-ups from every call

How Lyra saves teams hours each week

Quick demo of the platform

Ready to take meetings
to the next level?

What we’ll cover

Automatic notes and follow-ups from every call

How Lyra saves teams hours each week

Quick demo of the platform