Trust & Security

Enterprise-Grade Security.
Built From Day One.

Dhisana AI is SOC 2 Type II certified, cloud-native on Microsoft Azure, and built with end-to-end encryption. Your data security is not an afterthought — it is foundational to everything we build.

SOC 2 Type II Audited
Built on Azure Cloud Native
Encrypted In Transit & At Rest
GDPR Ready Privacy by Design

Security documentation available on request.

Our Commitment to Security

We handle your most valuable GTM data. That responsibility drives every engineering and operational decision we make.

Dhisana AI processes sensitive customer data, prospect intelligence, and business-critical pipeline information every day. We designed our platform from the ground up with security as a core architectural principle — not a bolt-on.

Our infrastructure runs natively on Microsoft Azure, leveraging enterprise-grade cloud services with built-in redundancy, automatic scaling, and multi-region resilience. Every piece of data is encrypted end-to-end, both in transit and at rest, using industry-standard AES-256 and TLS 1.2+ protocols.

We undergo regular independent security assessments and penetration testing conducted by multiple trusted third-party vendors used by enterprise customers worldwide. These audits verify that our controls remain effective against evolving threats.

SOC 2 Type II Certified

SOC 2 Type II Audited

Dhisana AI has successfully completed a SOC 2 Type II audit, demonstrating that our security controls are not only well-designed but operate effectively over time.

Unlike a Type I report (point-in-time), our Type II certification validates continuous, sustained compliance — giving you confidence in how we protect your data every day. The full audit report is available under NDA upon request.

Security

Protection against unauthorized access to systems and data

Availability

Systems are available for operation and use as committed

Confidentiality

Information designated as confidential is protected

Processing Integrity

System processing is complete, valid, accurate, and timely

Privacy

Personal information is collected, used, retained, and disclosed appropriately

Security Architecture

Cloud Native on Microsoft Azure

Our entire platform is built and deployed natively on Microsoft Azure, leveraging managed services designed for enterprise workloads.

  • Azure-managed Kubernetes for container orchestration
  • Multi-region deployment with automatic failover
  • Azure-native identity and access management
  • Built-in DDoS protection and network security
  • Backed by Microsoft for Startups program

End-to-End Encryption

All data is encrypted both in transit and at rest, ensuring your information is never exposed at any point in the pipeline.

  • TLS 1.2+ for all data in transit
  • AES-256 encryption for data at rest
  • Encrypted database connections and backups
  • Secure key management via Azure Key Vault
  • Zero plain-text storage of credentials or tokens

Independent Penetration Testing

We engage multiple trusted third-party security firms to conduct regular penetration testing and vulnerability assessments.

  • Annual pen tests by enterprise-trusted vendors
  • Application, network, and infrastructure assessments
  • OWASP Top 10 coverage in every test cycle
  • Findings triaged and remediated on strict SLAs
  • Re-verification after remediation

Access Controls & Identity

Least-privilege access and role-based controls ensure only the right people access the right data at the right time.

  • Role-based access control (RBAC)
  • Multi-factor authentication (MFA) enforced
  • Single sign-on (SSO) support
  • Audit logging of all access events
  • Quarterly access reviews

Data Privacy & Governance

Your data stays yours. We enforce strict data governance policies aligned with global privacy standards.

  • GDPR and CCPA compliant data handling
  • Data retention and deletion policies
  • No training of AI models on customer data
  • Data processing agreements available
  • Transparent privacy policy

Monitoring & Incident Response

Continuous monitoring and a well-drilled incident response process ensure threats are caught and contained rapidly.

  • 24/7 infrastructure monitoring and alerting
  • Centralized security event logging (SIEM)
  • Documented incident response playbook
  • Regular disaster recovery testing
  • Automatic anomaly detection

Security Practices

Secure Development Lifecycle

Code reviews, static analysis, and automated security scanning on every deployment.

Vulnerability Management

Continuous scanning with rapid patching of critical vulnerabilities.

Employee Security Training

All team members complete security awareness training and phishing simulations.

Vendor Security Assessments

All third-party integrations are evaluated for security posture before onboarding.

Business Continuity

Automated backups, disaster recovery plans, and regular failover testing.

Background Checks

Pre-employment screening for all employees with access to production systems.

Security FAQ

All data is stored in Microsoft Azure data centers in the United States. Our infrastructure leverages Azure's enterprise-grade physical security, redundancy, and compliance certifications.

Yes. We share our SOC 2 Type II report under NDA with prospective and existing customers. Contact us at [email protected] to request a copy.

No. Customer data is never used to train, fine-tune, or improve our AI models. Your data is used solely to deliver the services you have contracted for and is processed in accordance with our data processing agreement.

We maintain a documented incident response plan with defined roles, escalation paths, and communication procedures. Affected customers are notified promptly in accordance with our contractual obligations and applicable regulations.

Yes. We support SAML-based Single Sign-On (SSO) for enterprise customers. Contact our team for setup details and configuration guides.

We engage multiple independent, enterprise-trusted security firms to conduct regular penetration tests. These include application-layer, network-layer, and infrastructure assessments. Summary findings are available under NDA upon request.

Questions About Security?

Our team is ready to discuss your security requirements and share detailed compliance documentation.