Ender Turing handles sensitive customer-conversation data at scale β voice calls, chat transcripts, email, and ticket content from regulated industries like banking, insurance, and healthcare. Security isn't a marketing layer; it's a core engineering constraint.
This page documents our current security posture: the certifications we hold, how data flows through our systems, who can access what, and how we respond when something breaks. For Enterprise customers, this page is the public-facing summary β the full Trust & Compliance pack (SOC 2 report, penetration-test results, infrastructure diagrams, sub-processor list with detail) is available under NDA.
We hold and maintain the following certifications and align with the following frameworks:
Every byte of customer data is encrypted both in transit and at rest:
Access to customer data is governed by least-privilege principles:
Where your data lives is your choice:
If something goes wrong, our response is structured and predictable:
Report a vulnerability or suspected incident: security@enderturing.com. We acknowledge within 24 hours, even on weekends.
Every action in the platform is logged for audit:
Audit logs are immutable, retained per customer-defined policy (default: 7 years for Enterprise, 2 years for Growth). Available via API for SIEM integration. Audit-ready evidence packs can be exported on demand for regulators.
We use a small set of vetted sub-processors to operate the Service. Each is bound by a DPA and EU SCCs where applicable:
Enterprise customers receive 30-day advance notice of any new sub-processor handling their data, with a right to object. Full sub-processor list with descriptions is part of our DPA appendix.
Security is shared. Some responsibilities sit on your side:
We welcome reports from security researchers. If you've found a vulnerability:
External security assessments are part of our annual cadence:
Results summaries are available to Enterprise customers under NDA.
For security-specific inquiries, vulnerability reports, or compliance questions:
Standard Data Processing Agreement and MSA available for Enterprise customers. Pre-signed templates plus mark-up windows for legal teams.
Request templates βLatest independently-audited SOC 2 Type II report available under NDA. Covers security, availability, and confidentiality controls.
Request report βFull sub-processor list with descriptions, regions, and certifications. Updated quarterly. 30-day advance notice for any additions.
View on this site βAnnual third-party penetration-test summary available under NDA. Quarterly internal review summaries on request.
Request summary β