Syntphony Conversational AI
Product descriptionSupportAnalystsClient's portal
  • Start Here
    • 💡What is Syntphony Conversational AI
      • Main Features
    • 📖User Guide
  • CUSTOMER SUPPORT
    • 🆘Support Policy
      • Support Levels
      • Service Level Agreement
      • Severity Levels
      • Legacy Support
      • Lifecycle Policy
    • 🚙Support Procedures
      • Portal User Request
      • Tickets Creation
      • Environment Management
  • SECURITY & Compliance
    • 🔐Trust Center
      • Compliance and Certifications
      • Product security
      • Data Security
      • Privacy
      • Incident Management & Response
      • Availability & Reliability
      • Organizational Security
      • Business Continuity
      • Infrastructure
      • Threat Management
      • Sub-processors
Powered by GitBook
On this page
  • Data Encrypted At-Rest
  • Data Encrypted In-Transit
  • Encryption Key Management

Was this helpful?

  1. SECURITY & Compliance
  2. Trust Center

Data Security

Data Encrypted At-Rest

All data hosted by Syntphony Conversational AI is encrypted. Syntphony Conversational AI uses industry-accepted encryption products to protect data at rest, with 256-bit AES encryption.

Data Encrypted In-Transit

Syntphony Conversational AI cloud uses the latest cypher suites to encrypt all the data during transfer between its client channels and server: TLS 1.2/1.3, and HTTPS are used to protect data in transit.

Mutual TLS

mTLS, or mutual TLS, is a security protocol used to establish encrypted connections between client and server in a network. Unlike traditional TLS, where only the server is authenticated, mTLS authenticates both the client and server, ensuring mutual trust. This is achieved through the exchange of digital certificates, enhancing the overall security of the communication channel.

Encryption Key Management

All platform databases and snapshot backups use strong volume (disk) encryption by default to protect data at rest. The use of self-managed keys can help customers achieve additional levels of confidentiality and data segmentation.

PreviousProduct securityNextPrivacy

Last updated 12 months ago

Was this helpful?

🔐