Schedule a Demo

    Name

    Email

    Subject

    Message

    [honeypot message-679]

    Trust and Security

    We strive to meet the highest level of security certification across borders and industries. Our compliance and certification are managed by Vanta and our incredible audit partners.

    AICPA-seal

    SOC 2 Type 2

    We’re SOC 2 Type 2 compliant. Request reports here.

    GDPR-seal

    GDPR

    We’re GDPR compliant. Ask us for our DPA.

    soc2-type2-seal

    RedSentry

    Penetration test completed on 10-08-2004

    DansaDarataSoucia-Logo-Color-tag-e1614805778997

    Dansa D’arata Soucia

    Performed a SOC 2 Type 2 examination.

    Trusted by the next generation

    Latest Industry News

    Kaufman Rossin image

    Fisent Technologies Launches Testing Framework That Helps Enterprises Evaluate GenAI Model Suitability and Performance


    October 15, 2024 – Fisent’s GenAI Efficacy Framework (GEF) enables enterprises to measure, compare, and select the most effective GenAI models based on key metrics like accuracy, speed, cost, and consistency.

    Fisent First to Offer Applied Generative AI Process Automation Solution with Full Model Optionality


    August 28, 2024 – Fisent Technologies today announced it is the first to deliver an Applied GenAI Process Automation solution that offers full model optionality. The Fisent BizAI solution allows enterprises to select the right LLMs for the processes they are looking to automate and to effortlessly shift processes to different models.

    Fisent Secures Funding for GenAI Process Automation Solution


    August 06, 2024 – Fisent Technologies, a pioneer in Applied GenAI Process Automation solutions, has secured funding from strategic investors including Pegasystems, Sand Dollar Capital, and prominent entrepreneurs, which will fuel the growth of its BizAI product as the market leader in Applied GenAI Process Automation.

    FAQs

    For more information, contact us to schedule a Demo!
    How Fisent users are added and security around privileged access management?

    Least privilege principle is applied – where Users are added through the console provided by the cloud service provider. Access requires strong MFA, and is limited to executive level employees.

    How data flows in and out of BizAI, supporting infrastructure.

    See diagram at bottom of page.

    Describe access control and security around protecting customer data.
    1. BizAI is “zero retention” by design and so customer data is not retained after processing
    2. Only API usage metrics are stored and data is encrypted using platform-managed security keys

     

    How is customer data kept separate?
    1. BizAI leverages AWS architecture which is natively multi-tenant – enabling separation of data requests
    2. BizAI usage is an API request based process
    3. The required use of a customer-assigned unique API Key is incorporated into temporary data-at-rest construct

     

    How is encryption implemented and enforced in use, in transit and at rest?
    1. See diagram at bottom of page
    2. HTTPS
    3. In-memory processing
    4. AWS platform managed encryption of all storage services
      1. 256-bit Advanced Encryption Standard Galois/Counter Mode (AES-GCM)
    What access does Fisent have to our data, and evidence that demonstrates?
    1. Only the data this is deliberately sent through our APIs is available to the service
    2. See evidence of data retention document provided

     

    How is Data Loss Prevention implemented?
    1. Serverless technologies are “self healing” which means if a service goes down (interrupted) it immediately re-establishes connectivity
    2. Zero Retention (i.e. nothing retained, nothing to lose)
    If an employee attempts to exfiltrate our data, how will you detect it ,stop it, and notify us?
    1. Zero retention, we only retain API usage metrics
    2. If someone tried to export usage metrics, it gets logged by the platform service logging
    How is “Zero Knowledge” maintained?
    1. See diagram (Detailed elaboration has been provided in multiple info sec reviews)
    2. It’s a deliberate architectural pattern Fisent has applied to augment our safety & security posture
    Include data retention/removal process and documentation?

    We currently do not retain any of your data – zero retention

    Is data destruction certified?

    Not at this time

    Please describe your Secure Code development process.
    • Code reviews are performed for every pull-request
    • Packages are scanned daily for security vulnerabilities and incident reports
    • Branches and merging strategy is rule enforced to prevent unauthorized changes
    • Access and deployment controls are least-privilege control.
    Do you source 3rd party code reviews?

    Not at this time.

    Is there a code escrow? If you go out of business will we have access to the source code to maintain our systems?
    1. Not at this time
    2. All code is within a single Git repository hosted in GitHub. It would serve as the single source of truth.  
    3. As BizAI is built on an Infrastructure as Code (IaC) design we can deploy this code in minutes 
    Do you conduct 3rd party penetration testing against your application?

    We invest in test automation that is run daily and includes endpoint testing with a security focus.
    The surface area is restricted to a set of API endpoints supported by AWS API Gateway, a mature best-in-class service.

    Do you conduct 3rd party penetration testing against your application?

    We invest in test automation that is run daily and includes endpoint testing with a security focus.
    The surface area is restricted to a set of API endpoints supported by AWS API Gateway, a mature best-in-class service.

    Schedule a Demo

    To see BizAI in action, schedule a demo below

        Contact Information

        2 Bloor St E Suite 3500
        Toronto, ON M4W 1A8, Canada

        +1-647-277-2782

        [email protected]