Trust center

Security

Every workflow inherits enterprise-grade controls: segmented infrastructure, modern encryption, and a culture of rapid incident response.

Environment isolation

Dedicated VPCs per region with private networking between inference, orchestration, and data layers.

Encryption everywhere

TLS 1.3 terminates at the edge, data at rest is encrypted with AES-256 and secrets live in HSM-backed vaults.

Continuous monitoring

Runtime agents stream logs into our SIEM with automated alerting, paging, and weekly review rituals.

Assurances

  • SOC 2 Type II controls mapped and undergoing annual audits
  • HIPAA attestation with signed BAAs for eligible customers
  • Granular RBAC, SSO, and hardware-key enforcement for staff
  • Regional hosting in us-east and eu-central with failover runbooks

Incident response

We operate a 24/7 on-call rotation with a 30 minute SLA for critical security events. Customers receive a full report—including timeline, blast radius, and remediation—within 48 hours.

Contact security@audexe.com for questionnaires, pentest summaries, or to report an issue.