OctoAI Logo
Sign up
Log in
Sign up
Log in

Security at OctoML

Your data security and privacy is a top priority for OctoML. We continually invest in security capabilities and practices in our platform and processes. We are SOC 2 Type II certified.

If you have questions about using OctoML and meeting your specific compliance needs, let's setup a time to talk.

Contact Us
OctoAI is SOC 2 Type II certified as of fall 2023

Product Security

The below is a list of some of security measures we take to ensure our platform and data are secure. Your data is never used for training purposes.

Operational Security

blue policies security icon

Policies

OctoML has developed a comprehensive set of security policies covering a range of topics. These policies are updated frequently and shared with all employees.

red employee training security icon

Employee Training

Each OctoML employee is trained on security best practices and awareness during onboarding and continue with ongoing training programs. We perform disaster recovery and data restoration tests on an annual basis.

yellow change control security icon

Change control

OctoML uses robust change control policies to balance control and speed when making changes to the system.

blue backup and recovery security icon

Backups and Recovery

OctoML takes regular backups of data and performs regular tests of restoring that data in the event of a serious incident.

red pentest security icon

Pentests

We engage third-party security experts to perform detailed penetration tests on the OctoML platform.

Incident Reporting

Incident Response - OctoML has developed and uses policies and procedures for handling security events. These policies are regularly reviewed and updated. Also, OctoML has a responsible disclosure of security issue policy in place.