Not just what they do, but how they do it
Jamie captures meetings through a desktop app and delivers summaries in its platform. The Supernormal app also runs on your desktop, capturing full transcripts and pairing them with actionable suggestions. Here's how they differ.
How they capture
The Supernormal app runs as an app on your desktop and uses system audio to detect when a call or meeting is happening. It captures automatically when audio is live, or you can trigger captures manually for in-person conversations. No bots or browser tabs needed.
Jamie captures meetings through a desktop app. It processes audio and delivers AI-generated summaries and transcripts, but you manage outputs within the Jamie platform.
What they produce
Supernormal produces editable transcripts and summaries in the app, with action suggestions built in. Context is then available in the web app, where agents create deliverables like presentations, spreadsheets, and research documents.
Jamie creates AI-generated summaries and transcripts that can be edited in its web app. You then need to switch to a different tool to complete related tasks.
How you follow up
Supernormal drafts follow-ups in the app and opens them directly in Gmail, Slack, or Linear so you can send with one click. For broader work, agents in the web app handle presentations, briefs, and more.
Jamie can draft follow-up emails using its AI assistant sidebar. You ask the assistant to generate an email and it creates a draft in the platform that you can review and copy to send.
Jamie creates simple summaries. Supernormal delivers transcripts with action suggestions and agents that handle follow-up work and deliverables.
Enterprise-grade security standards
Supernormal is built with security at its core. We follow industry standards such as SOC2, encrypt data both in transit and at rest, enforce strict access controls, and maintain secure, automated backups — so your information stays protected, reliable, and accessible at all times.

SOC2
Stop digging through notes. Automatically draft and update from key points discussed in your meetings.ent
Encryption
Data in-transit is encrypted using TLS 1.2+ and at-rest using the industry standard AES-256 algorithm.
Access and Permissions
All content has permission rights and authentication requirements, enabling you to safely share your content.
Automatic and Secure Backups
Content is automatically and securely stored through cloud backups with advanced encryption and robust storage protocols.










