shield_locked Enterprise Security

Your knowledge is
secure by default.

We employ bank-grade security protocols, ensuring your audio, transcripts, and organizational intelligence never leave your control.

verified_user

SOC2 Type II &
Zero Data Usage

We process your data securely, encrypt it at rest using AES-256, and under no circumstances do we use your corporate meeting data to train public LLMs.

  • check SOC2 Type II Certified
  • check ISO 27001 Compliant
  • check Single Sign-On (SAML/OAuth)
admin_panel_settings AES-256
verified SOC2 Monitor
ACTIVE
lock Data Transit
SECURE

Comprehensive Protection

Every layer of our infrastructure is designed to defend your most sensitive organizational knowledge.

enhanced_encryption

Encryption Everywhere

All data is encrypted in transit using TLS 1.3 and at rest with AES-256 block-level encryption. Key management is handled securely via AWS KMS.

public

Data Residency

Choose where your data lives. We offer dedicated hosting regions in the US, EU (Frankfurt), and APAC (Sydney) to comply with local laws.

rule

Audit Trails

Maintain complete visibility. Every read, write, and access event is logged immutably and exportable via our Enterprise API for SIEM ingestion.

policy

Strict RBAC

Enforce least-privilege access. Granular Role-Based Access Controls sync with your IdP via SCIM to automatically manage employee lifecycles.

bug_report

Vulnerability Management

Continuous automated container scanning, static code analysis (SAST), and annual third-party penetration testing by independent security firms.

gavel

Privacy Frameworks

Fully compliant with global privacy frameworks including GDPR and CCPA. We provide out-of-the-box tools for Data Subject Access Requests (DSAR).

Security FAQ

psychology Do you train AI models on my meeting data?

Absolutely not. We have strict, legally binding Zero Data Retention policies with our foundational model providers. Your telemetry and transcript data is never used to improve public models or shared across tenants.

domain Where is my data physically located?

By default, all tenant data is isolated and stored in AWS US-East (N. Virginia). Enterprise customers can select dedicated deployments in Europe (Frankfurt, Ireland) or Asia-Pacific (Sydney, Tokyo) to meet strict data residency requirements.

key Can I manage my own encryption keys?

Yes. AudioToNotes Enterprise supports Dedicated Key Management (EKM/BYOK). You can wrap your tenant's master key with a key you control via AWS KMS, allowing you to instantly revoke access to all data at any time.