Products
Resources
Built for trust,
from day one.
Built for trust,
from day one.
Lyra is independently audited (SOC 2 Type I & II) and continuously monitored to protect your data, your customers, and your reputation.
Enterprise-grade security
Peace of mind, built-in. Lira applies industry-standard controls across our product and infrastructure.
SOC 2 compliance
Lyra has undergone a Service Organization Controls audit (SOC 2 Type II).
SOC 2 compliance
Lyra has undergone a Service Organization Controls audit (SOC 2 Type II).
SOC 2 compliance
Lyra has undergone a Service Organization Controls audit (SOC 2 Type II).
HIPAA compliance
Privacy and security measures to ensure that Protected Health Information (PHI) is appropriately safeguarded.
HIPAA compliance
Privacy and security measures to ensure that Protected Health Information (PHI) is appropriately safeguarded.
HIPAA compliance
Privacy and security measures to ensure that Protected Health Information (PHI) is appropriately safeguarded.
GDPR compliance
Committed to compliance with Europe’s General Data Protection Regulation (GDPR).
GDPR compliance
Committed to compliance with Europe’s General Data Protection Regulation (GDPR).
GDPR compliance
Committed to compliance with Europe’s General Data Protection Regulation (GDPR).
Admin controls
Restrict access to system-level privileges.
Admin controls
Restrict access to system-level privileges.
Admin controls
Restrict access to system-level privileges.
Audit logs
Audit logs automatically keep track of important workspace events over the last 3 months.
Audit logs
Audit logs automatically keep track of important workspace events over the last 3 months.
Audit logs
Audit logs automatically keep track of important workspace events over the last 3 months.
App approvals
Control which third-party applications have access to your Lyra workspace.
App approvals
Control which third-party applications have access to your Lyra workspace.
App approvals
Control which third-party applications have access to your Lyra workspace.
Identity management
Strong access controls powered by industry-standard identity.
Single sign-on (SSO)
Authenticate into Lyra using Google SSO or login via email with email codes.
Single sign-on (SSO)
Authenticate into Lyra using Google SSO or login via email with email codes.
Single sign-on (SSO)
Authenticate into Lyra using Google SSO or login via email with email codes.
Passkeys
Secure and fast login without having to rely on passwords.
Passkeys
Secure and fast login without having to rely on passwords.
Passkeys
Secure and fast login without having to rely on passwords.
SAML
Lyra offers SAML via most identity providers (Okta, OneLogin, LastPass, Auth0, Bitium, and more).
SAML
Lyra offers SAML via most identity providers (Okta, OneLogin, LastPass, Auth0, Bitium, and more).
SAML
Lyra offers SAML via most identity providers (Okta, OneLogin, LastPass, Auth0, Bitium, and more).
SCIM
Provision and deprovision users in Lyra through your identity provider.
SCIM
Provision and deprovision users in Lyra through your identity provider.
SCIM
Provision and deprovision users in Lyra through your identity provider.
Domain claiming
Add an extra layer of security and keep your teammates in the right workspace.
Domain claiming
Add an extra layer of security and keep your teammates in the right workspace.
Domain claiming
Add an extra layer of security and keep your teammates in the right workspace.
Login restrictions
Restrict login to specific methods for added security (Google SSO or email logins).
Login restrictions
Restrict login to specific methods for added security (Google SSO or email logins).
Login restrictions
Restrict login to specific methods for added security (Google SSO or email logins).
IP restrictions
Restrict workspace access to your private network.
IP restrictions
Restrict workspace access to your private network.
IP restrictions
Restrict workspace access to your private network.
Privacy
Your data stays yours. We collect only what’s needed to provide the service and protect it accordingly.
Private lyras
Create private lyras for work that should only be accessed by certain workspace members.
Private lyras
Create private lyras for work that should only be accessed by certain workspace members.
Private lyras
Create private lyras for work that should only be accessed by certain workspace members.
Data encryption
Lyra forces HTTPS on all connections and encrypts data in-transit with TLS 1.2. All data at-rest is secured using AES 256-bit encryption.
Data encryption
Lyra forces HTTPS on all connections and encrypts data in-transit with TLS 1.2. All data at-rest is secured using AES 256-bit encryption.
Data encryption
Lyra forces HTTPS on all connections and encrypts data in-transit with TLS 1.2. All data at-rest is secured using AES 256-bit encryption.
Ready to take meetings
to the next level?
What we’ll cover
Automatic notes and follow-ups from every call
How Lyra saves teams hours each week
Quick demo of the platform
Ready to take meetings
to the next level?
What we’ll cover
Automatic notes and follow-ups from every call
How Lyra saves teams hours each week
Quick demo of the platform