Security isn't a feature.
It's the foundation.
Every conversation your AI receptionist handles is protected by enterprise-grade encryption, continuous monitoring, and the most rigorous compliance standards in the industry.
Infrastructure
Enterprise-grade infrastructure
- ✓Hosted on AWS with SOC 2 certified data centers
- ✓Multi-region deployment with automatic failover
- ✓N+1 redundancy across all critical systems
- ✓99.9% uptime SLA backed by financial credits
- ✓DDoS protection and Web Application Firewall
Compliance
Comprehensive regulatory compliance
SOC 2 Compliance
- Annual third-party audits by a reputable third-party auditor
- Strict logical access controls with principle of least privilege
- Formal change management process with peer review
- Continuous monitoring with real-time alerting and anomaly detection
- Documented incident response and disaster recovery procedures
- Employee security awareness training conducted quarterly
Data handling
Your data, fully protected
Encryption at Rest
- AES-256 encryption for all stored data
- Isolated storage per tenant with unique keys
- Hardware security modules (HSM) for key management
Encryption in Transit
- TLS 1.3 enforced on all connections
- Certificate pinning for mobile clients
- Perfect forward secrecy (PFS) enabled
Call Recording
- End-to-end encrypted recordings
- Configurable retention policies per account
- Automatic deletion after retention period
- Role-based access controls for playback
Access controls
Defense in depth
RBAC
Role-based access with granular permissions for every resource and action
MFA
Multi-factor authentication enforced for all accounts, supporting TOTP and hardware keys
Audit Logs
Complete activity trail, exportable in SIEM-compatible formats, 2-year retention
SSO
SAML 2.0 and OIDC support for enterprise identity integration
Penetration testing & bug bounty
We actively invite security researchers
Our bug bounty program rewards responsible disclosure. Annual penetration testing is conducted by independent third-party firms.
| Severity | Payout |
|---|---|
| Critical | Recognition + reward by severity |
| High | Recognition + reward by severity |
| Medium | Recognition |
| Low | Recognition |
For responsible disclosure, contact [email protected]
Incident response
Guaranteed response times
| Priority | Response | Resolution |
|---|---|---|
| P0(Critical) | 15 min | 4 hours |
| P1(High) | 1 hour | 8 hours |
| P2(Medium) | 4 hours | 24 hours |
| P3(Low) | 24 hours | 72 hours |
Data residency
Your data stays where you need it
US
United States
Default, Virginia & Oregon regions
EU
European Union
Frankfurt & Ireland regions
Custom
Custom
Dedicated deployment in your preferred region
Questions about security?
Our security team is ready to discuss your requirements, provide documentation, or schedule a detailed review.
Contact [email protected]