Security

Your data security is our top priority

Enterprise-grade security built into every layer of the platform. We protect your data so you can focus on building.

Encryption

All data is encrypted at rest using AES-256 and in transit using TLS 1.3. API keys and secrets are stored in encrypted vaults with hardware-backed key management.

SOC 2 Compliance

We maintain SOC 2 Type II certification, demonstrating our commitment to security, availability, processing integrity, confidentiality, and privacy.

Access Controls

Role-based access control (RBAC) ensures team members only access what they need. SSO integration supports SAML 2.0 and OIDC providers.

Infrastructure Security

Our infrastructure runs on SOC 2 certified cloud providers with automated security patching, network isolation, and DDoS protection.

Audit Logging

Comprehensive audit logs track every action across your organization. Logs are immutable and retained for compliance requirements.

Data Isolation

Each tenant's data is logically isolated. Your agent data, conversation logs, and configurations are never shared across accounts.

Security Practices

Ongoing measures we take to keep your data safe.

  • Regular penetration testing by independent security firms
  • Automated vulnerability scanning in our CI/CD pipeline
  • Security incident response plan with defined SLAs
  • Employee security training and background checks
  • Bug bounty program for responsible disclosure
  • Data processing agreements (DPA) available on request
  • GDPR and CCPA compliant data handling practices
  • Regular disaster recovery and business continuity testing

Have a security question?

Our security team is available to answer questions, provide documentation, and support your compliance requirements.