Privacy, Security & Compliance at the Core of ASG Platform

Platform compliance

HIPAA

Health Insurance Portability and Accountability Act

ISO 27001

ISO 27001:2013 Certification

ISO 27018

ISO 27018:2019 Certification

SOC 2 Type II

SOC 2 Type II Compliant

Platform Security

SSO

Our platform ensures secure access with user-level authorization, utilizing industry-standard SSO solutions. Company users can access their bot projects and integrations via Google SSO, Microsoft SSO, ADFS, and Azure AD. At the bot level, we also support AD, LDAP, SAML, and OAuth2.

Permissions

Role-based access control allows you to set specific permission levels for team members such as developers, admins, testers, and more. Depending on the role, users can modify workflows, integrations, databases, bot training, intent mapping, and other functions.

Password & Credential Storage

ASG Platform enforces password complexity standards, with credentials encrypted using a salted hash (SHA-256).

Network & Data Security

Network Data Security
Network Data Security
Network Data Security

Data Hosting

ASG Platform services and data are hosted across multiple regions, including the US, EU, and Asia. With disaster recovery built-in, our infrastructure spans N+1 availability zones, ensuring seamless operation even in the event of a data center failure.

Encryption

All data transmitted to and from the platform is encrypted with SSL TLS 256 (HTTPS). Access keys are securely stored in Vaults and are refreshed every quarter to maintain security.

Pentest & Vulnerability Scanning

Our platform undergoes continuous vulnerability scanning using third-party tools, and our security team actively addresses any issues. We also engage external experts annually to conduct detailed penetration tests. To ensure compliance with international data laws, we offer PII redaction and masking. Additional safeguards include WAF, DDOS protection, IPS, and IDS.

Virtual Private Cloud & Access Control Lists

Our servers are secured within our virtual private cloud (VPC) with network access control lists (ACLs) that block unauthorized access to our internal network.

An Enterprise Leader’s Blueprint: Build vs. Buy—Choosing the Best AI for Customer Service

Discover how to select the ideal AI solution to revolutionize your customer service in this comprehensive e-guide.