Not just what they do, but how they do it
Supernormal creates summaries with agents for drafting follow-ups built in.
How they capture
The Supernormal app runs on your desktop and uses system audio to detect when a call or meeting is happening. It captures automatically when audio is live, or you can trigger captures manually for in-person conversations. No bots or browser tabs needed.
Motion uses an AI Notetaker that auto-joins Zoom, Meet, or Teams calls. It records the meeting, then generates transcripts, summaries, and action items.
What they produce
After the desktop app captures your meeting, Supernormal delivers editable transcripts and summaries in the web app. Agents can then handle deliverables – from slides to spreadsheets to research briefs.
Motion's AI Task Manager auto-schedules your day. It creates tasks from meeting notes, prioritizes them based on deadlines and dependencies, and reshuffles your calendar as priorities shift.
How you follow up
Supernormal displays post-meeting prompts in your notes (make slides, draft email, extract actions) that create deliverables for review and sending. The web app extends this with agents that produce presentations, documents, and other work.
Motion drafts follow-up emails and auto-sends them to meeting attendees with summaries and action items. It also connects with tools like Gmail, Slack, and Notion to sync tasks and reflect calendar changes across your workspace.
Motion helps you plan your day. Supernormal helps you complete the work with meeting summaries and agents that produce deliverables.
Enterprise-grade security standards
Supernormal is built with security at its core. We follow industry standards such as SOC2, encrypt data both in transit and at rest, enforce strict access controls, and maintain secure, automated backups — so your information stays protected, reliable, and accessible at all times.

SOC2
Stop digging through notes. Automatically draft and update from key points discussed in your meetings.ent
Encryption
Data in-transit is encrypted using TLS 1.2+ and at-rest using the industry standard AES-256 algorithm.
Access and Permissions
All content has permission rights and authentication requirements, enabling you to safely share your content.
Automatic and Secure Backups
Content is automatically and securely stored through cloud backups with advanced encryption and robust storage protocols.










