This document outlines our robust security protocols, designed to meet the needs of businesses requiring high standards of data protection and operational reliability.

At Portkey AI, we understand the critical importance of security in today’s digital landscape and are committed to delivering state-of-the-art solutions that protect our clients’ data and ensure their AI applications run smoothly.

Security Framework

Authentication

Portkey AI ensures secure API access through token-based authentication mechanisms, supporting Single Sign-On (SSO) via OIDC on enterprise plans.

We also implement Virtual Keys, which provide an added layer of security by securely storing provider API keys within a controlled and monitored environment.

This multi-tier authentication strategy is crucial for protecting against unauthorized access and ensuring the integrity of user interactions.

Encryption

To protect data integrity and privacy, all data in transit to and from Portkey AI is encrypted using TLS 1.2 or higher. We employ AES-256 encryption for data at rest, safeguarding it against unauthorized access and breaches.

These encryption standards are part of our commitment to maintaining secure data channels and storage.

Access Control

Our access control measures are designed with granularity to offer precise control over who can see and manage data.

For enterprise clients, we provide enhanced Role-Based Access Control (RBAC), allowing for stringent governance suited to complex organizational needs.

This system is pivotal for enforcing security policies and ensuring that only authorized personnel have access to sensitive operations and data.

Compliance and Data Privacy

Compliance with Standards

Our platform is compliant with leading security standards, including SOC2, ISO27001, GDPR, and HIPAA.

Portkey AI undergoes regular audits, compliance checks, and penetration testing conducted by third-party security experts to ensure continuous adherence to these standards.

These certifications demonstrate our commitment to global security practices and our ability to meet diverse regulatory requirements.

Privacy Protections

At Portkey AI, we prioritize user privacy. Our privacy protocols are designed to comply with international data protection regulations, ensuring that all data is handled responsibly.

We engage in minimal data retention and deploy advanced anonymization technologies to protect personal information and sensitive data from being exposed or improperly used.

Read our privacy policy here - https://portkey.ai/privacy-policy

System Integrity and Reliability

Network and System Security:

We protect our systems with advanced firewall technologies and DDoS prevention mechanisms to thwart a wide range of online threats. Our security measures are designed to shield our infrastructure from malicious attacks and ensure continuous service availability.

Reliability and Availability:

Portkey AI offers an industry-leading 99.995% uptime, supported by a global network of 310 data centers.

This extensive distribution allows for effective load balancing and edge deployments, minimizing latency and ensuring fast, reliable service delivery across geographical locations.

Our failover mechanisms are sophisticated, designed to handle unexpected scenarios seamlessly and without service interruption.

Incident Management and Continuous Improvement

Incident Response

Our proactive incident response team is equipped with the tools and procedures necessary to quickly address and resolve security incidents.

This includes comprehensive risk assessments, immediate containment actions, and detailed investigations to prevent future occurrences.

We maintain transparent communication with our clients throughout the incident management process. Please review our status page for incident reports.

Updates and Continuous Improvement

Security at Portkey AI is dynamic; we continually refine our security measures and systems to address emerging threats and incorporate best practices. Our ongoing commitment to improvement helps us stay ahead of the curve in cybersecurity and operational performance.

Contact Information

For more detailed information or specific inquiries regarding our security measures, please reach out to our support team:

Privacy Policy

Terms of Service

Data Processing Agreement

Trust Portal