At OutRival, safeguarding your information is our top priority. We are dedicated to delivering a secure and reliable platform, enabling businesses and vendors to develop AI companions
At OutRival, security and trust are foundational values. We are proud to announce that we have completed SOC 2 Type 2 audit, demonstrating our ongoing commitment to maintaining the highest standards of security and operational excellence. <br /> Our SOC 2 Type 1 and Type 2 reports are available upon request. Please contact security@outrival.com to access the reports.
We employ robust encryption techniques to safeguard your personal information, ensuring that it remains confidential and secure.
We use AES-256 to encrypt stored data, ensuring it remains safe and unreadable without decryption keys, even if unauthorized access occurs.
All data transmitted between our systems and your devices is encrypted using TLS, ensuring privacy and integrity. We also enforce secure HTTPS connections for additional protection.
We use KMS compliant with FIPS 140-2 to securely generate, store, and manage encryption keys, isolating key storage from application data to prevent unauthorized access.
We periodically rotate encryption keys to maintain security. Access to these keys is strictly controlled and limited to authorized personnel with appropriate clearance levels.
We employ state-of-the-art firewalls to protect our network perimeter and implement network segmentation to isolate critical systems, thereby minimizing the risk of lateral movement in the event of a breach.
Our infrastructure includes IDPS to monitor network traffic and detect signs of malicious activity, ensuring quick response to any potential threats.
Access to our platform requires MFA, providing an additional layer of security by requiring a combination of something users know (passwords) and something they have (authenticator apps or hardware tokens).
Access to our systems is governed by RBAC, ensuring that users only have access to the resources they need, based on their roles and responsibilities.
Our development team follows secure coding guidelines to prevent vulnerabilities like SQL injection and cross-site scripting (XSS). Automated tools and manual code reviews help detect security flaws early in development.
We conduct regular vulnerability assessments to identify and mitigate potential weaknesses in our applications.
We continuously monitor our infrastructure for unusual activity using advanced tools that analyze system and network behavior, allowing us to respond quickly to potential incidents.
All critical systems log their activity to a centralized platform, enabling comprehensive auditing and rapid analysis during security investigations.
Our systems are regularly backed up, ensuring that data can be restored in the event of accidental deletion, corruption, or a security incident.
We have disaster recovery plans in place to ensure our platform can quickly recover from disruptions, minimizing downtime and data loss.
We conduct regular audits and assessments of our security measures to identify and address any potential vulnerabilities, ensuring continuous protection for our users.
We comply with relevant data protection regulations and standards to ensure that your information is handled in accordance with the highest security standards.
We believe in transparency. Our security policies and practices are clearly outlined, providing you with insight into how we protect your data.
If you've spotted a security vulnerability on OutRival, please reach out to us at security@outrival.com. We take all reports seriously and strive to address valid issues promptly. For any other security inquiries or concerns, feel free to contact our security team at the same address. We're here to assist you as swiftly as possible.
Ready to Transform
Your Admissions Process?