Conversational ai security

Enterprise-grade security and data protection

Boost.ai’s platform comes with all the tools you need to keep your data secure and meet compliance requirements.

download DATA SHEET

Protecting our organization and your data

ISO 27001

Information Security Management System (ISMS)

ISO/IEC 27001 certified since May 2021 with 110/114 security controls implemented, complex information security management system (ISMS) with whole company in scope (no grey zones).

Learn more
ISO 27701

ISO 27701

Privacy Information Management System (PIMS)

Coming in 2022

GDPR-features

Your data, your rules, 
your compliance

Learn more
OWASP logo

OWASP

Open Web Application
Security Project

Learn more

Solution security

Boost.ai’s conversational AI includes robust and adjustable security and privacy protection mechanisms, such as:

  • Segregated single-tenant customer environments
  • Availability zones
  • Data encryption at transfer and at rest
  • Malware detection
  • Intrusion detection
  • Hardening of servers to reduce attack surface
  • Vulnerability monitoring
  • Patch management
  • Distributed Denial of Service (DDoS) protection
  • Password quality checks, 2-factor authentication
  • Single Sign On (SSO)
  • Role segregation
  • IP whitelisting
  • Anonymization and partial masking of data
  • Log and event tracking
  • Penetration testing

Compliance programs held by AWS
Shared responsibility model with AWS

“Security and compliance is a key part of who we are and what we deliver. Our goal has always been to make the best solution for enterprises and to do that you also have to be best in class on security and compliance.”
Lars Selsås
Founder and CEO, boost.ai

Enterprise tech experts trust (and love) boost.ai

AVO logoDeloitte logoKPMG logoAccenture logoCapgemini logo

Latest security resources

Internal security

Boost.ai’s compliance programs are based on industry best practices from globally recognized standards, such as:

  • Screening
  • Security awareness training
  • Mandatory security policies
  • Access control
  • Asset management
  • Operations security
  • Communication security
  • Privcay management
  • Development security
  • Cryptographic controls
  • Physical security
  • Device management
  • Incident management
  • Risk management
  • Audits
  • Business continuity
  • Disaster recovery
Picture:  People looking at security posters
security model

What are you waiting for?

One of our helpful humans can help you get started
Contact