Trust center
Security
Every workflow inherits enterprise-grade controls: segmented infrastructure, modern encryption, and a culture of rapid incident response.
Environment isolation
Dedicated VPCs per region with private networking between inference, orchestration, and data layers.
Encryption everywhere
TLS 1.3 terminates at the edge, data at rest is encrypted with AES-256 and secrets live in HSM-backed vaults.
Continuous monitoring
Runtime agents stream logs into our SIEM with automated alerting, paging, and weekly review rituals.
Assurances
- SOC 2 Type II controls mapped and undergoing annual audits
- HIPAA attestation with signed BAAs for eligible customers
- Granular RBAC, SSO, and hardware-key enforcement for staff
- Regional hosting in us-east and eu-central with failover runbooks
Incident response
We operate a 24/7 on-call rotation with a 30 minute SLA for critical security events. Customers receive a full report—including timeline, blast radius, and remediation—within 48 hours.
Contact security@audexe.com for questionnaires, pentest summaries, or to report an issue.