Not just what they do, but how they do it
Jamie captures meetings through a desktop app and delivers summaries in its platform. The Supernormal app also runs on your desktop, capturing full transcripts. Here's how they differ.
How they capture
The Supernormal app runs as an app on your desktop and uses system audio to detect when a call or meeting is happening. It captures automatically when audio is live, or you can trigger captures manually for in-person conversations. No bots or browser tabs needed.
Jamie captures meetings through a desktop app. It processes audio and delivers AI-generated summaries and transcripts, but you manage outputs within the Jamie platform.
What they produce
After the desktop app captures your meeting, Supernormal produces editable transcripts and summaries in the web app. Agents can then create deliverables like presentations, spreadsheets, and research documents.
Jamie creates AI-generated summaries and transcripts that can be edited in its web app. You then need to switch to a different tool to complete related tasks.
How you follow up
Supernormal displays post-meeting prompts in your notes that create drafts you can review and send. For broader work, agents in the web app handle presentations, briefs, and more.
Jamie can draft follow-up emails using its AI assistant sidebar. You ask the assistant to generate an email and it creates a draft in the platform that you can review and copy to send.
Jamie creates simple summaries. Supernormal delivers transcripts and agents that handle follow-up work and deliverables.
Enterprise-grade security standards
Supernormal is built with security at its core. We follow industry standards such as SOC2, encrypt data both in transit and at rest, enforce strict access controls, and maintain secure, automated backups — so your information stays protected, reliable, and accessible at all times.

SOC2
Stop digging through notes. Automatically draft and update from key points discussed in your meetings.ent
Encryption
Data in-transit is encrypted using TLS 1.2+ and at-rest using the industry standard AES-256 algorithm.
Access and Permissions
All content has permission rights and authentication requirements, enabling you to safely share your content.
Automatic and Secure Backups
Content is automatically and securely stored through cloud backups with advanced encryption and robust storage protocols.










