Skip to ContentOctai Logo
Security

Data Privacy & Security

Octai utilizes enterprise-grade best practices to protect our customers’ data. We take our data privacy and security obligations seriously. Our platform, processes, and systems are designed to protect our users and their data. We have implemented information security controls in every part of our operations and we are consistently working to strengthen our stance.
Overview

Security Overview

Solve problems faster, more reliably, and with higher accuracy
Overview
Octai builds on infrastructure from Amazon Web Services (AWS) which provide industry-leading security, privacy, operation monitoring, and compliance.
Continuous Security Control Monitoring
Octai uses an automation platform to continuously monitor 100+ internal security controls across the organization against the highest possible standards. 
Best Practices
Octai utilizes enterprise-grade best practices to protect our customers' sensitive health information.
Automated alerts and evidence collection allows Octai to confidently prove its security and compliance posture any day of the year, while fostering a security-first mindset and culture of compliance across the organization.
Features

Security Taken Seriously

For more information, to report an issue, or to ask any questions, contact support@octai.com
Security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data.
Our people can only access the data they need to do their job. We follow a need-to-know with least privileged access principle and won’t access user data without your permission. Employee workstations are configured with full-disk encryption, strong passwords, and automatic locking. Employees are prohibited from installing unauthorized software or using portable media. All employees and contractors are bound by NDA.
Octai works with industry leading security firms to perform annual network and application layer penetration tests.
Octai utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.
Data is encrypted both in-transit using TLS and at rest.
If you believe you’ve discovered a bug in Octai’s security, please get in touch at security@Octai.com. Our security team promptly investigates all reported issues.
Our Privacy Policy and Platform Terms of Service contain additional detail on elements of our privacy and security policies.
Security Diagram - Octai.com

See Your Future, Today!

Revolutionizing business outcomes with predictive analytics for every team
Try Octai for free
Demand forecast model - Octai.com
Resources

In the news

Keep up to date with our lastest news, blog posts, webinars and events.
chevron-down linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram