Schedule a Demo

    Name

    Email

    Subject

    Message

    [honeypot message-679]

    Trust and Security

    At Fisent, safe and secure use of AI is paramount. We employ enterprise grade data security policies with the help of Vanta and Dansa D’Arata Soucia as our compliance partners.

    soc2-type2-seal

    SOC 2 Type II

    We’re SOC 2 Type 2 compliant.
    Request reports here.

    red sentry

    RedSentry

    Penetration test completed
    on 10-08-2004.

    DansaDarataSoucia-Logo-Color-tag-e1614805778997

    Dansa D’arata Soucia

    Performed a SOC 2 Type 2
    examination.

    Trusted by Enterprises Globally

    Best-in-Class Security practices

    • Zero Retention:

      Client data processed through BizAI is never retained or used for training. Fisent ensures this with our own APIs and with our adjusted agreements with model providers.

    • Encryption:

      All data at-rest is secured using AES-256 encryption, with data in transit encrypted using TLS 1.3.

    • Accuracy Tracking:

      Our GenAI Efficacy Framework (GEF) allows clients to track output accuracy and ensure internal standards are met prior to and following deployment.

    • Access Controls:

      Least privilege principle is applied – where Users are added through the console provided by the cloud service provider.  Access requires strong MFA, and is limited to specific employees with a need for access.

    • Regular Audits:

      Fisent compliance partners conduct regular security audits and penetration tests to identify and address any vulnerabilities.

    • Employee Education:

      All our employees receive routine security awareness training, creating a culture of security consciousness.

    Your data remains your own.
    Our solutions do not train or retain client data.

    FAQs

    For more information, contact us to schedule a Demo!
    How does Fisent use my (company/customer) data?

    BizAI is a zero-retention solution, where no data beyond simple API usage metrics (e.g., processing time, volumes, etc.) are retained or persisted. Fisent does not store client prompts, outputs or inputs and does not train or fine tune models on processed client data. Additionally, the enterprise LLMs used by BizAI do not train on client data. In other words, clients can process content without concern of their inputs, outputs or prompts being retained in any form. Client data is only stored within a client’s own application layer.

    How does Fisent mitigate hallucinations and ensure response accuracy?

    Fisent mitigates hallucinations and provides clients with unparalleled accuracy by layering a range of proprietary and research prompt techniques into BizAI deployments. Additionally, with our analytics tools, clients can easily view output accuracy rates prior to deployment. Finally, BizAI outputs have a high degree of explainability through the rationale function which provides a brief explanation of the logic behind the generated outputs.

    How does BizAI scale with increased usage?

    BizAI is built in AWS with serverless technology enabling infinite scalability. Additionally, Fisent’s agile engineering team consistently monitors usage patterns and performance to proactively mitigate any service outages.

    How is customer data kept separate?

    BizAI leverages AWS architecture which is natively multi-tenant – enabling separation of data requests.  Secondarily, BizAI usage is an API request based process, meaning Users do not login to utilize BizAI – it’s “machine to machine”.  Additionally, the required use of a customer-assigned unique API Key is incorporated into temporary data-at-rest construct.

    How is encryption implemented and enforced in use, in transit and at rest?

    We apply several layers of controls to protect your data some of which include: HTTPS, In-memory processing, AWS platform managed encryption of all storage services (e.g., 256-bit Advanced Encryption Standard Galois/Counter Mode (AES-GCM)).

    What is Fisent’s secure code development process?

    We conduct code reviews for every pull-request.  Furthermore, code packages are scanned daily for security vulnerabilities and incident reports.  Code branches and merging strategy is rule enforced to prevent unauthorized changes, and access and deployment controls are least-privilege control.

    Does Fisent conduct 3rd party penetration testing against your application?

    Yes, we do conduct PenTests.  Additionally, we invest in test automation that is run daily and includes endpoint testing with a security focus.  Also the surface area is restricted to a set of API endpoints supported by AWS API Gateway, a mature best-in-class service.

    Want to Dive Deeper?