Back to Home

Security at CedarAI

Your data is the foundation of your business. We protect it with enterprise-grade security at every layer — so you can focus on closing deals, not worrying about data breaches.

SOC 2 Infrastructure256-bit EncryptionTCPA Compliant99.9% Uptime

Encryption Everywhere

  • All data encrypted in transit with TLS 1.3
  • Data at rest encrypted with AES-256
  • Database-level encryption for all stored records
  • API keys and credentials stored in encrypted vaults

Access Controls

  • Role-based access control (RBAC) for all users
  • Multi-factor authentication (MFA) available
  • Principle of least privilege for employee access
  • Audit logs for all data access and modifications

Infrastructure Security

  • Hosted on SOC 2 compliant cloud infrastructure
  • DDoS protection and WAF on all endpoints
  • Automated vulnerability scanning
  • Network segmentation and firewalls

Compliance

  • TCPA compliance built into messaging features
  • DNC list checking before every outreach
  • Fair Housing Act awareness in AI outputs
  • CCPA and GDPR data subject request support

Business Continuity

  • Automated daily backups with point-in-time recovery
  • Multi-region redundancy for high availability
  • 99.9% uptime SLA for all paid plans
  • Disaster recovery plan tested quarterly

Monitoring & Response

  • 24/7 infrastructure monitoring and alerting
  • Security incident response plan in place
  • Regular penetration testing by third parties
  • Bug bounty program for responsible disclosure

Have security questions or need to report a vulnerability?

Contact Our Security Team