Security & Privacy

Customer trust is at the core of our business

Read More
hero-security
Icons_CultureSecurity

Security Culture

At Replicant, we embody a secure by design culture. From the people we employ to the solutions we develop, we're committed to earning and maintaining your trust.

Icons_PlatformSecurity

Data Security

Replicant's enterprise platform is fully compliant with current data protection regulations at the state and federal level.

Icons_Data Privacy

Secure Platform

Replicant customers leverage features that give them the control to customize how their data is accessed, used, and retained.

Icons_24-7

High Availability

Replicant’s platform provides high availability
infrastructure that runs 24/7 with efficient load balancing across thousands of concurrent calls.

Enterprise ready compliance

Replicant’s platform security standards satisfy industry-specific regulations as well as state, federal, and international regulatory requirements for data privacy and protection. Replicant is a HIPAA, SOC 2, PCI, and GDPR compliant platform.

security-badges-1
map

Secure and reliable infrastructure

Replicant’s platform provides high availability infrastructure that runs 24/7 with efficient load balancing across thousands of concurrent calls so that you can scale effortlessly and securely.

Continuous commitment to security

Replicant is committed to conducting regular audits and continuous testing to ensure we’re delivering the highest performing and most secure platform.

img-record-audit-procedure

Secure Platform

Replicant's security features give customers the control to customize how their data is accessed, used, and retained

Data encryption

All data is encrypted both at rest and in transit over public networks

Data security

Your data is hosted in its own secure database

Data recovery

Our databases are stored in authentication-protected storage and utilize point-in-time recovery

Physical security

We are hosted on Google Cloud Platform which provides robust, physical data center security

Access control

Customers can configure roles to determine what actions users can take on their data

Data usage

Customers can configure the right data retention policy for their business needs

Rigorous testing

We conduct regular audits and continuous testing with third party penetration testing firms

SSO

Authenticate users using any OIDC-compliant SSO provider