Security
Built for the data your customers trust you with.
Independently audited. Detailed reports, sub-processor list, and DPA available on request.
Security & trust
Enterprise-grade security.
Independently audited.
We treat your data — and your customers' voices — like the regulated asset it is.
SOC 2 Type II
Independently audited
ISO 27001
Information security
GDPR
EU data protection
HIPAA-aligned
Healthcare-ready controls
DPDP
India compliance
Encryption
TLS 1.3 in transit. AES-256 at rest.
Tenant isolation
Dedicated wallets, recordings, and SIP trunks per tenant.
Controls
RBAC, full audit trail, configurable retention, regional residency.
Trust center
Audit reports and security questionnaires are available on request. Email [email protected].
Data Processing Agreement
Our standard DPA is available for download here.
Sub-processors
The current list of sub-processors and infrastructure providers is maintained at /security/sub-processors.
Stop stitching four vendors together.
Spin up your first AI agent in under 5 minutes. Free credits included. No credit card.