Safety

Security & privacy by design

Etheon embeds security and privacy into the control plane—encryption everywhere, strict access control, and full auditability—so your real-time AI stays compliant, observable, and safe under load.

Security & privacy commitments

Etheon protects your data by design: we never train on your private data without explicit opt-in; all traffic is encrypted in transit and at rest (CMK available); data is isolated per tenant; and access is enforced with least-privilege RBAC and SSO/SAML. You control retention, deletion, and region-bound residency, with comprehensive audit logs and incident response SLAs. We also support GDPR/CCPA data-subject requests end-to-end. Learn more on our Business data privacy page. For user controls and choices, visit Consumer privacy page.

Compliance & Governance

Compliance by design for real-time AI

Even in stealth, Etheon runs to enterprise standards: SOC 2/ISO 27001–aligned controls, GDPR/CCPA processes, data residency with customer-managed keys, and no training on your data unless you opt in. Least-privilege RBAC with SSO/SAML, immutable audit logs, secure SDLC and third-party pen tests—plus model governance (lineage, canary/shadow, rollback)—keep real-time learning safe and EU AI Act–ready.

  • SOC 2/ISO 27001–aligned control framework
  • GDPR/CCPA-ready: DSR workflows, consent, data minimization
  • Zero-retention by default; opt-in model training only
  • Data residency & customer-managed encryption keys (KMS/CMK)
  • SSO/SAML, least-privilege RBAC, and full audit trails
  • AI governance: model cards, lineage, approvals, canary/shadow
  • Secure SDLC, pen testing, vulnerability and incident management
Security & compliance

External testing

Independent penetration tests and red-team exercises by accredited firms. Findings are CVSS-scored, remediated under SLA, and summary reports are available under NDA while we’re in stealth.

Security testing

Customer requirements

Control mappings to SOC 2 / ISO 27001, GDPR/CCPA DPAs, region-bound residency, and HIPAA-ready patterns for eligible deployments. See our Product Compliance Guide to align Etheon with your regulator.

Compliance requirements

Security, Privacy & Compliance Features

Etheon data isolation and regional residency
Etheon encryption and key management
Etheon identity and access controls
Etheon audit trails and governance
Etheon privacy controls and data use

Per-tenant data stores and VPC scoping keep workloads isolated. Pin storage and processing to US/EU regions to meet latency and regulatory requirements.

Security & Privacy

Report a vulnerability

We run a responsible disclosure program. If you discover a security issue in an Etheon product, API, or system, report it privately and we’ll work with you to remediate quickly. Safe-harbor terms, rapid triage, and recognition or rewards apply to qualifying findings.

Abstract lock and circuitry representing responsible disclosure

Security & privacy, by design

See how Etheon safeguards data with encryption in transit and at rest (CMK), tenant isolation, least-privilege RBAC, SSO/SAML, audit logs, and region-bound residency—while aligning to SOC 2, ISO 27001, and GDPR/CCPA.