Our Security Commitment
PG:AI was founded in 2024 with security as a core principle. We believe that trust is earned through transparency and consistent security practices, not just compliance checkboxes.We are actively working with Drata to achieve SOC 2 certification, which we expect to complete within the next 6 months.
Security Framework
Defense in Depth
We employ multiple layers of security controls to protect your data:Data Protection
Encryption at rest and in transit for all customer data
Access Control
Role-based access with multi-factor authentication options
Continuous Monitoring
24/7 monitoring of security events and automated alerting
Data Security
- Minimal Data Collection: We only collect essential user information (email and name)
- Secure Storage: All data is encrypted and stored with industry-leading providers
- Access Restrictions: Strict controls on who can access customer data
- Regular Reviews: Quarterly access reviews and security assessments
Compliance & Certifications
- Founded in 2024 with security-first principles
- Implementing industry best practices
- Regular internal security assessments
- Working with trusted security vendors
Shared Security Model
Our Responsibilities
- Securing the platform infrastructure
- Protecting data at rest and in transit
- Maintaining application security
- Managing vendor security
- Incident response and monitoring
Your Responsibilities
- Managing user access to your account
- Using strong authentication methods
- Keeping credentials secure
- Reviewing user permissions regularly
- Reporting security concerns promptly
Security Features for Customers
Authentication Options
Authentication Options
- Email/password authentication
- Social login providers
- Enterprise SSO integration
- Multi-factor authentication (MFA)
Access Management
Access Management
- Role-based access control
- User permission management
- Activity logging and audit trails
- Session management controls
Data Protection
Data Protection
- Encrypted data storage
- Secure API access
- Regular backups
- Data retention controls
Vendor Security
We carefully select and monitor all third-party services used in our platform. All vendors must meet our security requirements and sign appropriate data processing agreements.View Subprocessors
See the complete list of third-party services we use
Security Best Practices
1
Enable MFA
Turn on multi-factor authentication for all user accounts
2
Regular Reviews
Review user access and permissions quarterly
3
Strong Passwords
Use unique, complex passwords for all accounts
4
Monitor Activity
Regularly check account activity for unusual behavior
Reporting Security Issues
If you discover a security vulnerability or have concerns about our security practices:Please report security issues directly to [email protected] rather than through public channels. We take all security reports seriously and will respond promptly.