lockSecurity & Compliance
Enterprise-Grade Security. Your Data, Protected.
Security is foundational at Skode, not an afterthought. We protect your data with industry-standard encryption, rigorous access controls, and continuous monitoring.
lock
AES-256
Encryption at Rest
vpn_lock
TLS 1.3
Encryption in Transit
policy
GDPR
Compliant
verified_user
SOC 2
In Progress
cloud
Infrastructure Security
- check_circleCloud-hosted on enterprise-grade infrastructure with 99.9% uptime SLA
- check_circle99.9% Uptime SLA — Guaranteed uptime SLA on all paid plans with real-time status monitoring at status.skodeai.com
- check_circleAES-256 encryption for all data at rest
- check_circleTLS 1.3 encryption for all data in transit
- check_circleNetwork isolation with private VPC and firewall rules
- check_circleDDoS protection and rate limiting
- check_circleAutomated backups with point-in-time recovery
- check_circleMulti-region data redundancy
shield
Application Security
- check_circleOAuth 2.0 authentication with SSO support
- check_circleSSO & SAML 2.0 — Enterprise single sign-on with SAML 2.0 support. Connect your identity provider (Okta, Azure AD, Google Workspace) for centralized access control
- check_circleRole-based access control (RBAC) with granular permissions
- check_circleSession management with automatic timeout
- check_circleCSRF and XSS protection on all endpoints
- check_circleRate limiting and brute-force protection
- check_circleInput validation and SQL injection prevention
- check_circleContent Security Policy (CSP) headers
database
Data Security
- check_circleData Residency Options — Choose where your data is stored. Available regions include US, EU, and India for compliance with local data protection regulations
- check_circleDaily automated backups with 30-day retention
- check_circleData deletion procedures per GDPR/CCPA requirements
- check_circleAudit logs for all data access and modifications
- check_circleData export capability in standard formats
- check_circleLogical tenant isolation in multi-tenant architecture
psychology
AI Data Handling
- check_circleVoice AI recordings processed via OpenAI Whisper — not stored after transcription
- check_circleAI field extraction via GPT-4o-mini — prompts never include other customer data
- check_circleAI chatbot conversations processed in real-time — training data never shared
- check_circleAll 38+ AI tools process data in isolated sessions
- check_circleOpt-out available for all AI features
- check_circleNo customer data used to train AI models
verified
Compliance
- check_circleGDPR compliant — data processing agreements available
- check_circleCCPA compliant — California consumer privacy rights respected
- check_circleSOC 2 Type II — certification in progress
- check_circleVAPT certified — regular vulnerability assessments and penetration testing
- check_circleISO 27001 — planned for 2026
- check_circleHIPAA — available on Enterprise plans
emergency
Incident Response
- check_circleDedicated security incident response team
- check_circleCustomer notification within 72 hours of confirmed breach
- check_circlePost-incident review with root cause analysis
- check_circleContinuous monitoring and alerting
- check_circleStatus page at status.skodeai.com for real-time updates
Responsible Disclosure
We take security vulnerabilities seriously. If you discover a security issue, please report it responsibly.
security@skodeai.comarrow_forwardRequest a Security Review
Enterprise customers can request detailed security documentation, penetration test reports, and complete a security questionnaire.
Contact Salesarrow_forward