Announcing Tetrate Agent Router Service: Intelligent routing for GenAI developers

Learn more
Trust & Security Hero Background

Trust & Security

Your trust is our priority. Tetrate is committed to maintaining the highest standards of security, compliance, and data protection across all our products and services.

Compliance & Certifications

SOC 2 Type II

Successfully completed SOC 2 Type II audit demonstrating our commitment to security, availability, and confidentiality controls.

ISO 27001

Certified to ISO 27001 standards for information security management systems.

FedRAMP Ready

Tetrate provides FIPS-validated solutions suitable for FedRAMP Rev. 5 environments, with built-in documentation templates for System Security Plans.

GDPR Compliance

Fully compliant with GDPR requirements for data protection and privacy.

Security Practices

Data Encryption

All data is encrypted in transit using TLS 1.3 and at rest using AES-256 encryption. We implement end-to-end encryption for sensitive communications.

Access Controls

Multi-factor authentication (MFA) is required for all user accounts. We implement role-based access controls (RBAC) and principle of least privilege.

Security Monitoring

24/7 security monitoring and threat detection using advanced SIEM tools. Real-time alerts and automated response systems protect against threats.

Vulnerability Management

Regular security assessments, penetration testing, and vulnerability scanning. We maintain a comprehensive patch management program.

Incident Response

Established incident response procedures with defined escalation paths. Our security team is trained to respond to security incidents within defined SLAs.

Business Continuity

Comprehensive disaster recovery and business continuity plans. Regular testing ensures our ability to maintain service availability.

Privacy & Data Protection

Data Minimization

We collect only the data necessary to provide our services. No unnecessary personal information is stored or processed.

Data Residency

Customer data is stored in secure, geographically distributed data centers. We respect data residency requirements and regulations.

Data Retention

Clear data retention policies ensure data is only kept for as long as necessary. Automated deletion processes enforce these policies.

User Rights

We respect user rights including access, rectification, erasure, and portability. Easy-to-use tools are provided for data subject requests.

Third-Party Security

Vendor Assessment

All third-party vendors undergo comprehensive security assessments before engagement. We maintain a vendor risk management program.

Subprocessor Management

We maintain an up-to-date list of subprocessors and notify customers of any changes. All subprocessors are bound by strict data protection agreements.

Security Requirements

All third-party services must meet our security standards including encryption, access controls, and compliance certifications.

Ready to Make AI Safe?