Your Data. Protected at Every Step.
Security and privacy are foundational to how we build. We take data protection seriously and work to align our practices with leading industry frameworks.
Our Security Approach
We align our security practices with recognized industry frameworks and work with infrastructure providers who maintain independent certifications.
SOC 2 Type II Certified
Independently audited against SOC 2 Trust Services Criteria for security, availability, and confidentiality.
- Access controls, encryption, and incident response
- Third-party audit completed February 2025
- Continuous monitoring and annual re-certification
ISO 27001:2022 Certified
Certified information security management system covering all operational security domains.
- Comprehensive ISMS covering all security domains
- Certification achieved June 2025
- Annual surveillance audits and continuous improvement
GDPR & HIPAA Compliant
Full compliance with EU data protection regulation and US healthcare data handling standards.
- GDPR-compliant data processing and subject rights
- HIPAA safeguards for protected health information
- Financial services regulatory awareness built in
Security at Every Layer
We apply a layered approach to security across our infrastructure, data handling, and application design.
Infrastructure & Access
-
Encryption at Rest & in TransitData encrypted at rest and in transit using industry-standard encryption protocols through our infrastructure providers.
-
Access Control & AuthenticationMulti-factor authentication enforced. Role-based access controls (RBAC) with least-privilege principle. Regular access reviews.
-
Continuous Monitoring24/7 automated threat detection. Security Information and Event Management (SIEM) with Datadog. Incident response team on call.
-
Disaster RecoveryAutomated daily backups with geographic redundancy. RTO: 4 hours. RPO: 1 hour. Quarterly disaster recovery tests.
Design & Governance
-
Security & Privacy by DesignSecurity review in all development phases. Threat modeling for new features. Privacy impact assessments before deployment.
-
Incident ResponseDocumented incident response plan. Trained response team. Initial notification within 24 hours of discovery.
-
Vulnerability ManagementRegular penetration testing. Automated vulnerability scanning. Third-party security assessments annually.
-
Employee TrainingAnnual security awareness training for all staff. Regular phishing simulations. Onboarding security certifications.
Request a detailed security assessment: We provide comprehensive documentation and are happy to discuss your specific security requirements with your team.
Trusted AI Infrastructure
Built on trusted platforms from leading cloud and AI providers.
Azure OpenAI
Foundation models hosted on Microsoft's cloud infrastructure with audit logging and access controls.
AWS Bedrock (Anthropic Claude)
Managed service providing access to advanced models with security controls and privacy protections.
Supabase PostgreSQL
Open-source PostgreSQL with built-in encryption and automated backups on secure cloud infrastructure.
PropelAuth
Modern authentication platform with passwordless sign-in, SSO, and comprehensive audit trails.
Datadog Monitoring
Real-time system monitoring, log aggregation, and security alerting across all infrastructure components.
MongoDB (Optional)
Flexible document database with field-level encryption, role-based access, and automated compliance.
Regulatory Compliance
Our platform is designed to support your organization's compliance obligations across key regulatory frameworks.
GDPR
Designed to support GDPR requirements including data access, erasure, and portability. Data processing agreements available upon request.
HIPAA
Built on HIPAA-eligible infrastructure. Business Associate Agreements available upon request for applicable use cases.
CCPA/CPRA
Designed to support California Consumer Privacy Act requirements including data access, deletion, and opt-out requests.
Financial Services
Designed with financial services regulatory considerations in mind. Built to support your organization's compliance requirements.
Data Residency
Data storage location controls. Support for EU data residency. Geographic redundancy without cross-border transfer.
Compliance Audits
Annual independent audits. Compliance documentation available. Transparent security and privacy reporting.
Ready to get started?
Let's discuss how we can deliver AI solutions while maintaining your security and compliance standards.
Book a Demo