Security

Enterprise-Grade Security & Compliance

Built from the ground up with security in mind. Your voice data is protected with industry-leading encryption and compliance standards.

ISO 27001

In Progress

88% complete

SOC 2 Type II

In Progress

65% complete

GDPR

Compliant

UK Data Protection Act

Compliant

Encryption

Industry-standard encryption protects your data at every stage

  • TLS 1.3

    All data in transit encrypted with TLS 1.3

  • AES-256

    Data at rest encrypted with AES-256 encryption

  • End-to-end encrypted voiceprints

    Voiceprint data is encrypted throughout its lifecycle

Certifications & Compliance

Meeting the highest industry standards

  • ISO 27001
    In Progress

    Certification in progress (Month 8 of 8)

  • SOC 2 Type II
    In Progress

    In progress - 65%+ controls covered alongside ISO 27001

  • GDPR Compliant
    Complete

    Full compliance with EU data protection regulations

  • Data Residency
    Available

    Options available: UK, EU, US

Access Controls

Granular control over who can access what

  • Role-based access control (RBAC)

    Define permissions based on user roles

  • API key rotation and management

    Easily rotate and manage API credentials

  • Multi-factor authentication

    MFA required for dashboard access

  • IP whitelisting

    Restrict API access to approved IP addresses

Audit & Monitoring

Complete visibility into system activity

  • Comprehensive audit logs

    Track all API calls and administrative actions

  • Real-time threat detection

    Automated monitoring for suspicious activity

  • Quarterly penetration testing

    Regular third-party security assessments

  • Incident response procedures

    Documented and tested response protocols

Data Privacy

Your data, your control

  • Zero knowledge architecture

    Voiceprints stored with zero-knowledge principles

  • Configurable data retention

    Choose retention periods from 30-365 days

  • Right to deletion (GDPR Article 17)

    Full support for data erasure requests

  • Data processing agreements

    DPAs available for enterprise customers

Security by Design

Security isn't an afterthought. It's built into every layer of our platform

Infrastructure Security

Hosted on AWS with enterprise-grade security controls and regular audits

24/7 Monitoring

Continuous security monitoring and automated threat detection

Security Team

Dedicated security professionals focused on protecting your data

Questions about security?

Our security team is happy to answer any questions and provide detailed documentation for your compliance requirements.