Back to Home
Security at CedarAI
Your data is the foundation of your business. We protect it with enterprise-grade security at every layer — so you can focus on closing deals, not worrying about data breaches.
SOC 2 Infrastructure256-bit EncryptionTCPA Compliant99.9% Uptime
Encryption Everywhere
- All data encrypted in transit with TLS 1.3
- Data at rest encrypted with AES-256
- Database-level encryption for all stored records
- API keys and credentials stored in encrypted vaults
Access Controls
- Role-based access control (RBAC) for all users
- Multi-factor authentication (MFA) available
- Principle of least privilege for employee access
- Audit logs for all data access and modifications
Infrastructure Security
- Hosted on SOC 2 compliant cloud infrastructure
- DDoS protection and WAF on all endpoints
- Automated vulnerability scanning
- Network segmentation and firewalls
Compliance
- TCPA compliance built into messaging features
- DNC list checking before every outreach
- Fair Housing Act awareness in AI outputs
- CCPA and GDPR data subject request support
Business Continuity
- Automated daily backups with point-in-time recovery
- Multi-region redundancy for high availability
- 99.9% uptime SLA for all paid plans
- Disaster recovery plan tested quarterly
Monitoring & Response
- 24/7 infrastructure monitoring and alerting
- Security incident response plan in place
- Regular penetration testing by third parties
- Bug bounty program for responsible disclosure
Have security questions or need to report a vulnerability?
Contact Our Security Team