Skip to main content

Security isn't a feature.
It's the foundation.

Every conversation your AI receptionist handles is protected by enterprise-grade encryption, continuous monitoring, and the most rigorous compliance standards in the industry.

SOC 2 Type IIIn progress
HIPAABAA-ready
GDPRReady
CCPAReady

Infrastructure

Enterprise-grade infrastructure

  • Hosted on AWS with SOC 2 certified data centers
  • Multi-region deployment with automatic failover
  • N+1 redundancy across all critical systems
  • 99.9% uptime SLA backed by financial credits
  • DDoS protection and Web Application Firewall
PYREXAus-east-1us-west-2eu-west-1

Compliance

Comprehensive regulatory compliance

SOC 2 Compliance

  • Annual third-party audits by a reputable third-party auditor
  • Strict logical access controls with principle of least privilege
  • Formal change management process with peer review
  • Continuous monitoring with real-time alerting and anomaly detection
  • Documented incident response and disaster recovery procedures
  • Employee security awareness training conducted quarterly

Data handling

Your data, fully protected

Encryption at Rest

  • AES-256 encryption for all stored data
  • Isolated storage per tenant with unique keys
  • Hardware security modules (HSM) for key management

Encryption in Transit

  • TLS 1.3 enforced on all connections
  • Certificate pinning for mobile clients
  • Perfect forward secrecy (PFS) enabled

Call Recording

  • End-to-end encrypted recordings
  • Configurable retention policies per account
  • Automatic deletion after retention period
  • Role-based access controls for playback

Access controls

Defense in depth

RBAC

Role-based access with granular permissions for every resource and action

MFA

Multi-factor authentication enforced for all accounts, supporting TOTP and hardware keys

Audit Logs

Complete activity trail, exportable in SIEM-compatible formats, 2-year retention

SSO

SAML 2.0 and OIDC support for enterprise identity integration

Penetration testing & bug bounty

We actively invite security researchers

Our bug bounty program rewards responsible disclosure. Annual penetration testing is conducted by independent third-party firms.

SeverityPayout
CriticalRecognition + reward by severity
HighRecognition + reward by severity
MediumRecognition
LowRecognition

For responsible disclosure, contact [email protected]

Incident response

Guaranteed response times

PriorityResponseResolution
P0(Critical)15 min4 hours
P1(High)1 hour8 hours
P2(Medium)4 hours24 hours
P3(Low)24 hours72 hours

Data residency

Your data stays where you need it

US

United States

Default, Virginia & Oregon regions

EU

European Union

Frankfurt & Ireland regions

Custom

Custom

Dedicated deployment in your preferred region

Questions about security?

Our security team is ready to discuss your requirements, provide documentation, or schedule a detailed review.

Contact [email protected]