Trust & Security

Enterprise-Grade Security

We protect your data with the same rigor we help you protect yours. Security isn't just our product—it's our foundation.

Encryption at Rest & Transit

All data encrypted using AES-256 at rest and TLS 1.3 in transit. Your scan data never travels unprotected.

SOC 2 Type II Compliant

Our infrastructure and processes are audited annually. We meet the highest standards for security and availability.

Multi-Tenant Isolation

Each customer's data is logically isolated. Enterprise customers can opt for dedicated infrastructure.

Role-Based Access Control

Granular permissions for team members. Admin, Analyst, and Viewer roles with audit logging.

Regular Penetration Testing

We eat our own dog food. Our platform undergoes regular security assessments by third-party firms.

Compliance Ready

Generate reports for SOC 2, PCI-DSS, ISO 27001, and HIPAA compliance requirements.

Security Practices

Infrastructure Security

  • Hosted on AWS with multi-region redundancy
  • 99.9% uptime SLA with automatic failover
  • DDoS protection and Web Application Firewall
  • Regular vulnerability scanning and patching
  • Network segmentation and intrusion detection

Application Security

  • Secure development lifecycle (SDL) practices
  • Code review and static analysis on all changes
  • Dependency scanning for known vulnerabilities
  • Bug bounty program for responsible disclosure
  • Regular third-party penetration testing

Data Protection

  • AES-256 encryption for data at rest
  • TLS 1.3 for all data in transit
  • Secure key management with HSM
  • Automated backup and disaster recovery
  • Data retention policies per plan tier

Access Control

  • Multi-factor authentication (MFA) available
  • SSO integration (SAML, OIDC) for Enterprise
  • Role-based access control (RBAC)
  • Session management and automatic timeout
  • Comprehensive audit logging

Compliance

  • SOC 2 Type II certified
  • GDPR compliant with DPA available
  • CCPA compliant
  • Annual security audits by third parties
  • Security documentation available on request

Report a Vulnerability

Found a security issue? We appreciate responsible disclosure. Please email security@aiptx.io with details. We respond within 24 hours and offer rewards for valid reports.

RaptorX

Autonomous AI agent for red team assessments and VAPT

SOC 2 Type II Certified

SOC 2 Type II

Certified

ISO 27001 Compliant

ISO 27001

Compliant

Built with enterprise-grade security and compliance