Home Security, Compliance and Responsible AI

AiDash is secure

We are committed to security from start to finish.

Data security

 

AiDash encrypts data at rest and in transit for all our customers. We use tools such as Amazon Web Services’s Key Management Service (KMS) to manage encryption keys using hardware security modules for maximum security according to industry best practices. AiDash has successfully completed a SOC 2 Type II Service Organization Control (SOC 2) audit for our system and services, demonstrating the effectiveness of controls involving operations and compliance.

Security audit reports

AiDash customers and partners can be assured that we do everything possible to keep their data and systems safe. To ensure that our procedures meet critical government-mandated compliance standards, we undergo rigorous Security Operations Center (SOC) assessments. This autonomous 3rd-party examination chronicles and certifies our controls that keep us in compliance. And we are pleased to report that for the second year in a row we have received SOC 2® Type II certification with no exceptions.

Here are this year’s reports:

Responsible AI

 

For AiDash, responsible AI is an imperative. We develop, deploy, and use ethical AI in our solutions. Grounded in historical data, our solutions are contextualized to their specific environments and use AI to continuously evolve. Ongoing monitoring allows us to proactively detect issues and retrain AI models to address climate factors and data drift as well as other changes and biases, to deliver optimal performance.

Infrastructure security

 

AiDash uses Amazon Web Services (AWS) to host our application. We make full use of the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector. In addition, we deploy our application using containers run on AWS managed services, which means we typically do not manage servers or EC2 instances in production.

Application security

 

AiDash regularly engages some of the industry’s best application security experts for 3rd-party penetration tests. Our penetration testers evaluate the source code, running application, and the deployed environment. AiDash also uses high-quality static analysis tooling such as CodeQL, TruffleHog, and SonarQube to secure our product at every step of the development process.