Skip to main content

Security and Privacy

Updated over 2 months ago

Product Security

  • Regular Security Scans

  • Ongoing Monitoring

  • Encryption: In Transit and at Rest

  • Cloud Hosting: AWS and GCP

Access Controls

  • Least Privilege Principle

  • User Access Reviews

  • Restricted Customer Data Access

  • Limited Access to Production

Audit & Compliance

  • Third-Party Pen testing

  • Change Management Policies

  • Incident Response Plan

No training on your data

You data is not used to train Chamelio or any of our AI sub-processors models.

SOC 2 (Type 2)

Our report certifies that our security policies and controls continuously meet the highest industry standards.

LLM optimization

We use the best AI for every job, not just one. Chamelio continuously benchmarks models from leading providers, automatically deploying the top performer for your specific task to guarantee the most accurate and reliable results.

Did this answer your question?