Security

Security Without Compromise

Enterprise-grade protection for your synthetic workforce. Every action auditable. Every boundary enforced.

01 — PRINCIPLES

Built for Enterprise Trust

Security is not a feature—it's the foundation of everything we build.

Zero Trust Architecture

Synths operate with the minimum permissions required. Every action requires explicit authorization through your existing IAM policies.

Your Perimeter, Your Rules

Synths run inside your security perimeter—VPC, on-prem, or hybrid. We don't store your data. We process it where you control it.

Complete Auditability

Every decision logged. Every action traced. The Work Ledger provides immutable receipts for compliance and forensics.

02 — DATA PROTECTION

Your Data Stays Yours

Encryption at Rest & In Transit

All data encrypted using AES-256 at rest and TLS 1.3 in transit. No exceptions.

No Data Retention

Synths process data in real-time. We don't store customer data beyond the session scope you define.

SSO Integration

Synths authenticate through your existing identity provider—Okta, Azure AD, Google Workspace.

Role-Based Access Control

Synths inherit permissions from your RBAC system. They see only what you allow them to see.

03 — COMPLIANCE ROADMAP

Our Path to Certification

We're building toward industry-standard certifications with a clear timeline.

IN PROGRESS

SOC 2 Type I

Security controls assessment underway. Expected completion: Q2 2026.

PLANNED

SOC 2 Type II

Continuous compliance monitoring. Target: Q4 2026.

PLANNED

ISO 27001

Information security management certification. Target: 2027.

Questions About Security?

Our team is ready to discuss your specific security requirements and provide detailed documentation.