Enterprise-grade security
Your leadership data is among the most sensitive information in your company. We treat it that way — with encryption, isolation, compliance, and transparency at every layer.
Core Protections
Security built into every layer
From encryption to access controls, every aspect of Acuent.ai is designed to protect your data.
SOC 2 Type II
Independently audited controls for security, availability, and confidentiality. Annual assessments ensure ongoing compliance.
AES-256 Encryption at Rest
All stored data is encrypted using AES-256, the same standard used by financial institutions and government agencies.
TLS 1.3 in Transit
Every connection to Acuent.ai is encrypted with TLS 1.3, ensuring your data is protected from interception during transmission.
Row-Level Security
Multi-tenant data isolation at the database level. Each organization's data is strictly separated — no cross-tenant access is possible.
No AI Training on Your Data
Your company data is never used to train AI models. Inputs and outputs are processed ephemerally and are not retained by our AI providers.
Regular Penetration Testing
Independent security firms conduct regular penetration tests. Identified vulnerabilities are triaged and resolved within defined SLAs.
Infrastructure
Built on trusted infrastructure
We partner with industry-leading cloud providers, each selected for their security track record and compliance certifications.
Application Layer
Vercel
Deployed on Vercel's edge network for global low-latency access, automatic DDoS protection, and zero-downtime deployments.
Database Layer
Supabase (PostgreSQL)
Enterprise PostgreSQL with row-level security policies, automated backups, point-in-time recovery, and encryption at rest.
AI Processing
Anthropic
AI analysis is processed via Anthropic's API with no data retention. Your inputs are not used for model training.
Payments
Stripe
PCI DSS Level 1 compliant payment processing. Acuent.ai never stores or has access to your full card details.
Compliance
Certifications & standards
We maintain rigorous compliance standards so your procurement and security teams can move forward with confidence.
SOC 2 Type II
Audited annually for security, availability, and confidentiality controls.
CompliantGDPR-Ready
Data processing agreements available. Support for data access, portability, and deletion requests.
ReadyData Processing Agreements
Standard DPAs available for all enterprise customers upon request.
AvailableData Practices
Your data, your control
We believe your data belongs to you. Full stop.
Data Retention
Active account data is retained for the duration of your subscription. Upon cancellation, data is available for export for 30 days, then permanently deleted.
Data Deletion
Request complete deletion of your data at any time. We process deletion requests within 30 days and confirm completion.
Data Portability
Export all of your data in standard formats at any time. Your data belongs to you — no lock-in, no friction.
Need more details?
We're happy to complete your security questionnaire, provide our SOC 2 report, or discuss our security practices in detail.