Security features
ZBrain is committed to ensuring the security, privacy, and compliance of our users' data. This page outlines the key security features, privacy standards, and compliance certifications that ZBrain adheres to, helping businesses meet their security obligations and protect sensitive data.
Compliance and security standards
ZBrain is committed to safeguarding your data at all times and has achieved the following industry-leading certifications that validate our robust security and privacy practices:
ISO 27001:2022 – A globally recognized standard for establishing, implementing, maintaining, and continuously improving an Information Security Management System (ISMS), ensuring systematic management of sensitive information.
SOC 2 Type II – Demonstrates ZBrain’s adherence to strict controls around data security, availability, confidentiality, and privacy.
These certifications ensure that ZBrain meets the highest standards for data security and privacy protection.
Key security features
ZBrain offers a suite of security features designed to provide robust protection, secure data access, and ensure compliance with industry regulations.
1. Role-based access control (RBAC)
ZBrain leverages role-based access control (RBAC) to manage user permissions with precision, ensuring that only authorized users can access specific resources based on their roles within the organization.
User permissions management and granular access control: Assign roles to users and define access levels to control who can view, edit, or create knowledge bases, apps, and agents. This ensures that only authorized individuals can access sensitive data and critical features, providing organizations with tight control over their resources and safeguarding information.
2. Data encryption
ZBrain ensures that all data is encrypted using robust encryption methods, including AES-256, to protect your data in transit and at rest.
End to end encryption: Data is encrypted during transmission using industry-standard encryption protocols to ensure confidentiality.
Data at rest encryption: All stored data is encrypted to prevent unauthorized access, ensuring privacy and security.
Comprehensive encryption coverage: Encryption is consistently applied to all data interactions, including inputs, outputs, model communications, and stored informationensuring sensitive data remains protected at every stage.
3. Data handling and storage
ZBrain offers a flexible and secure approach to data storage and handling.
Data storage regions: You can choose your preferred data storage region to comply with data residency requirements. ZBrain operates in multiple regions to meet global needs.
Data retention: ZBrain provides full control over your stored data, allowing you to delete or manage data at any time based on your organization’s needs and compliance requirements.
4. Tenant isolation and integration with identity providers
ZBrain ensures secure data isolation for different tenants and simplifies user management through seamless integration with enterprise identity providers:
Multi-tenant architecture: Secure isolation of data for different tenants ensures that each customer’s data is kept separate and protected.
Integration with enterprise identity providers: ZBrain integrates with popular identity management systems such as OAuth, making it easy to manage users, roles, and access control within your enterprise.
5. Network access control
ZBrain employs advanced network security measures to safeguard cloud resources and regulate traffic efficiently.
Security group controls and ACLs: ZBrain uses security group controls and Network Access Control Lists (ACLs) to regulate inbound and outbound traffic, ensuring only necessary communications are allowed to access cloud resources.
Strict traffic regulation: Only authorized and essential communications are permitted, minimizing exposure to potential unauthorized access and enhancing overall network security.
6. Vulnerability management and security patching
ZBrain proactively strengthens its security posture through regular assessments and timely patch updates.
Regular vulnerability assessments: ZBrain performs ongoing vulnerability scans and security audits to detect and mitigate potential risks early.
Security patch updates: Routine patching and updates to the system address security weaknesses, ensuring that ZBrain’s infrastructure remains resilient against evolving threats.
Proactive risk management: Utilizing tools like SAST/DAST and dependency scanning, ZBrain identifies potential vulnerabilities before they can be exploited, reducing risk exposure.
7. Data loss prevention (DLP)
ZBrain implements robust DLP strategies to ensure data integrity and protection.
Automated backups for point-in-time recovery: ZBrain conducts daily automated backups to ensure quick recovery in case of data loss.
Controlled access to stored data: Access to stored data is tightly regulated using AWS Identity and Access Management (IAM) policies and S3 bucket configurations, ensuring only authorized users can interact with critical information.
Last updated