AiDash is secure
We are committed to security from start to finish.
Data security
AiDash encrypts data at rest and in transit for all our customers. We use tools such as Amazon Web Services’s Key Management Service (KMS) to manage encryption keys using hardware security modules for maximum security according to industry best practices. AiDash has successfully completed a SOC 2 Type II Service Organization Control (SOC 2) audit for our system and services, demonstrating the effectiveness of controls involving operations and compliance.
Security audit reports
AiDash customers and partners can be assured that we do everything possible to keep their data and systems safe. To ensure that our procedures meet critical government-mandated compliance standards, we undergo rigorous Security Operations Center (SOC) assessments. This autonomous 3rd-party examination chronicles and certifies our controls that keep us in compliance. And we are pleased to report that for the second year in a row we have received SOC 2® Type II certification with no exceptions.
Here are this year’s reports:
- SOC 2® Type II report. Ask for the report
- SOC 3® report. Download publicly available report.
Responsible AI
For AiDash, responsible AI is an imperative. We develop, deploy, and use ethical AI in our solutions. Grounded in historical data, our solutions are contextualized to their specific environments and use AI to continuously evolve. Ongoing monitoring allows us to proactively detect issues and retrain AI models to address climate factors and data drift as well as other changes and biases, to deliver optimal performance.
Infrastructure security
AiDash uses Amazon Web Services (AWS) to host our application. We make full use of the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector. In addition, we deploy our application using containers run on AWS managed services, which means we typically do not manage servers or EC2 instances in production.
Application security
AiDash regularly engages some of the industry’s best application security experts for 3rd-party penetration tests. Our penetration testers evaluate the source code, running application, and the deployed environment. AiDash also uses high-quality static analysis tooling such as CodeQL, TruffleHog, and SonarQube to secure our product at every step of the development process.