top of page

Security

At Three Cliffs AI, we prioritize security through a comprehensive and proactive approach. We employ a combination of preventive measures and rapid response capabilities to protect your data. Our security strategy includes robust authentication protocols, stringent access controls, and secure data storage practices.We continuously monitor our systems for potential threats and utilize advanced security technologies to safeguard against unauthorized access. Additionally, our development processes follow best practices to ensure the highest level of security in our applications.We are committed to maintaining the trust of our customers by constantly refining our security measures and staying ahead of emerging threats.

Model Training

We have a strict policy of not training models on customer data, ensuring that your data remains private and secure.

Data Encryption

Data in transit is encrypted using renowned protocols. Sensitive data is encrypted at rest and securely stored on Amazon AWS servers located in the US.

Secure Login

We protect against unauthorized access through the use of secure authentication protocols, including OAuth 2.0 and OpenID Connect. Passwords are securely hashed using bcrypt. Additionally, we employ Multi-Factor Authentication (MFA) and Role-Based Access Control (RBAC) to further safeguard user accounts.

Protection Against Attacks

Our platform is fortified against DDoS attacks and incorporates advanced threat detection systems. We utilize a Web Application Firewall (WAF) to block malicious traffic, including SQL injection, cross-site scripting, and other common web application threats.

Data Storage

Customer data is strictly segregated to prevent commingling, ensuring that each customer's data remains isolated and protected.

Compliance

Our security practices are compliant with major data protection regulations such as GDPR and CCPA and HIPPA.

Questions?

For more information contact: security@threecliffsai.com 
"At the end of the day, the goals are simple: Safety and security."

Voltaire

bottom of page