Skip to main content
lockSecurity & Compliance

Enterprise-Grade Security. Your Data, Protected.

Security is foundational at Skode, not an afterthought. We protect your data with industry-standard encryption, rigorous access controls, and continuous monitoring.

lock

AES-256

Encryption at Rest

vpn_lock

TLS 1.3

Encryption in Transit

policy

GDPR

Compliant

verified_user

SOC 2

In Progress

cloud

Infrastructure Security

  • check_circleCloud-hosted on enterprise-grade infrastructure with 99.9% uptime SLA
  • check_circle99.9% Uptime SLA — Guaranteed uptime SLA on all paid plans with real-time status monitoring at status.skodeai.com
  • check_circleAES-256 encryption for all data at rest
  • check_circleTLS 1.3 encryption for all data in transit
  • check_circleNetwork isolation with private VPC and firewall rules
  • check_circleDDoS protection and rate limiting
  • check_circleAutomated backups with point-in-time recovery
  • check_circleMulti-region data redundancy
shield

Application Security

  • check_circleOAuth 2.0 authentication with SSO support
  • check_circleSSO & SAML 2.0 — Enterprise single sign-on with SAML 2.0 support. Connect your identity provider (Okta, Azure AD, Google Workspace) for centralized access control
  • check_circleRole-based access control (RBAC) with granular permissions
  • check_circleSession management with automatic timeout
  • check_circleCSRF and XSS protection on all endpoints
  • check_circleRate limiting and brute-force protection
  • check_circleInput validation and SQL injection prevention
  • check_circleContent Security Policy (CSP) headers
database

Data Security

  • check_circleData Residency Options — Choose where your data is stored. Available regions include US, EU, and India for compliance with local data protection regulations
  • check_circleDaily automated backups with 30-day retention
  • check_circleData deletion procedures per GDPR/CCPA requirements
  • check_circleAudit logs for all data access and modifications
  • check_circleData export capability in standard formats
  • check_circleLogical tenant isolation in multi-tenant architecture
psychology

AI Data Handling

  • check_circleVoice AI recordings processed via OpenAI Whisper — not stored after transcription
  • check_circleAI field extraction via GPT-4o-mini — prompts never include other customer data
  • check_circleAI chatbot conversations processed in real-time — training data never shared
  • check_circleAll 38+ AI tools process data in isolated sessions
  • check_circleOpt-out available for all AI features
  • check_circleNo customer data used to train AI models
verified

Compliance

  • check_circleGDPR compliant — data processing agreements available
  • check_circleCCPA compliant — California consumer privacy rights respected
  • check_circleSOC 2 Type II — certification in progress
  • check_circleVAPT certified — regular vulnerability assessments and penetration testing
  • check_circleISO 27001 — planned for 2026
  • check_circleHIPAA — available on Enterprise plans
emergency

Incident Response

  • check_circleDedicated security incident response team
  • check_circleCustomer notification within 72 hours of confirmed breach
  • check_circlePost-incident review with root cause analysis
  • check_circleContinuous monitoring and alerting
  • check_circleStatus page at status.skodeai.com for real-time updates

Responsible Disclosure

We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.

security@skodeai.comarrow_forward

Request a Security Review

Enterprise customers can request detailed security documentation, penetration test reports, and complete a security questionnaire.

Contact Salesarrow_forward