Trust Center
Trust is the driving force behind our security and privacy principles.
Our goal is to be completely transparent about our policies, so you can make informed decisions.
From our inception, it’s been critical to our success that security and privacy is not only a core requirement for giles® as product, but also as the cornerstone of how we conduct business.
Built with Modern Security Foundations
giles® was developed following modern industrial strength security principles, including the zero-trust security model, strong authentication practices, the principle of least privilege, and the shift-left approach to incorporating security into design, development, and operations.
Meeting the Highest Industry Standards
At Giles AI, your trust and privacy are our #1 priority. Discover resources related to understanding our unwavering commitment to data security, privacy, and compliance.
Soc 2 Type II
Certification to validate our dedication to safeguarding your sensitive data is secure and private. We instill robust internal controls and systems to ensure data security, availability, processing integrity, confidentiality, and privacy.
Secure Encryption of Data
All customer data is encrypted at rest with FIPS 140-2 validated crypto module utilizing AES 256 bit encryption. All data in transit is encrypted using TLS 1.2+.
GDPR Compliant
Customers’ personal information is maintained and secured in accordance with the EU's General Data Protection Regulation (GDPR).
Designed to Protect Your Organizational Data
Use Your Authentication Infrastructure
All giles® access requires authentication via your enterprise’s identity provider. Leverage your existing ISM infrastructure including LDAP/AD and existing SSO and 2FA setups.
Strict Permissions Enforcement
giles® incorporates a strong permissions model only showing you the information you have been granted access to. Permissions changes are in real-time, reflecting in giles® immediately.
Indexing Control
You can control what data giles® crawls and indexes, preventing giles® from surfacing results not wanted.
In Sync with Your Source Applications
Your source applications and their related GDPR processes are unaffected by integrating giles®. Furthermore, we ensure any customer sensitive data within the giles® domain (including collecting, storing, or transferring thereof) is secure and kept private.
Single Tenant Infrastructure
Using a single tenant architecture, we ensure our customers each have their own distinct giles® VPC instance running on cloud infrastructure that is not shared with other users.
Hosting options
You can choose whether you run giles® on your own on-premises VPC if you don't want your data to leave your organizational boundary, or choose to leverage deploying to our cloud, to save on operational costs. In either case, both options are secure and private.
Audit Logging
giles® can provide comprehensive and configurable audit logging of your company’s giles® usage. Using the SIEM tooling of your choice, you can import audit logs for monitoring, alerting and analysis.
Encryption of All Data
We ensure all data at rest is encrypted using AES 256, and that all data in transit is encrypted using TLS 1.2+. We also instil controls to limit data exfiltration risk.
Report Your Security Findings
If you believe you have found a security vulnerability in giles® product offering, please email your finding to [email protected].
Take a look at our Security and Privacy related FAQs and you can also email us with any further questions regarding giles® data security and privacy.