Conversational ai security

Enterprise-grade security and data protection’s platform comes with all the tools you need to keep your data secure and meet compliance requirements.

download DATA SHEET

Protecting our organization and your data

ISO certified

ISO 27001 and ISO 27701

Information Security Management System (ISMS) and Privacy Information Management System (PIMS)

ISO/IEC 27001 certified since May 2021 with 113/114 security controls implemented, complex information security management system (ISMS) with whole company in scope including subsidiaries.

ISO/IEC 27701 certified since June 2022 with 46/49 privacy controls implemented, complex privacy information management system (PIMS) with whole company in scope including subsidiaries.

Learn more
gdpr logo


Your data, your rules, your compliance

Learn more
OWASP logo


Open Web Application Security Project

Learn more

Solution security’s conversational AI includes robust and adjustable security and privacy protection mechanisms, such as:

  • Segregated single-tenant customer environments
  • Availability zones
  • Data encryption at transfer and at rest
  • Malware detection
  • Intrusion detection
  • Hardening of servers to reduce attack surface
  • Vulnerability monitoring
  • Patch management
  • Distributed Denial of Service (DDoS) protection
  • Password quality checks, 2-factor authentication
  • Single Sign On (SSO)
  • Role segregation
  • IP allowlisting
  • Anonymization and partial masking of data
  • Log and event tracking
  • Penetration testing

Compliance programs held by AWS
Shared responsibility model with AWS

“Security and compliance is a key part of who we are and what we deliver. Our goal has always been to make the best solution for enterprises and to do that you also have to be best in class on security and compliance.”
Lars Selsås
Founder and CEO,

Enterprise tech experts trust (and love)

AVO logoDeloitte logoKPMG logoAccenture logoCapgemini logo

Latest security resources

Internal security’s compliance programs are based on industry best practices from globally recognized standards, such as:

  • Screening
  • Security awareness training
  • Mandatory security policies
  • Access control
  • Asset management
  • Operations security
  • Communication security
  • Privcay management
  • Development security
  • Cryptographic controls
  • Physical security
  • Device management
  • Incident management
  • Risk management
  • Audits
  • Business continuity
  • Disaster recovery
Picture:  People looking at security posters
security model

Ready to get started?

Learn how you can improve customer satisfaction, cut costs and increase revenue with