cention.io
Product Use Cases Pricing About Trust
Book a Demo Get Started
Product Use Cases Pricing About Trust
Book a Demo Get Started

Security Policy

Our commitment to protecting your data with enterprise-grade security.

Last Updated: 15 December 2024

Security Overview

At Cention, security is foundational to everything we build. We implement comprehensive security controls to protect your data and ensure service reliability.

Certifications & Compliance

  • SOC 2 Type II - Independently audited security controls
  • ISO 27001 - Information security management system
  • GDPR - European data protection compliance
  • HIPAA Ready - Healthcare data protection capabilities
  • PCI DSS - Payment card data security

Data Encryption

Encryption at Rest

All data stored in our systems is encrypted using AES-256 encryption. Database encryption, disk encryption, and backup encryption are standard.

Encryption in Transit

All data transmitted to and from our services uses TLS 1.3 encryption. We enforce HTTPS for all connections and use certificate pinning for mobile applications.

Infrastructure Security

  • Cloud infrastructure hosted in SOC 2 certified data centres
  • Network segmentation and firewalls
  • DDoS protection and mitigation
  • Regular vulnerability scanning and penetration testing
  • Intrusion detection and prevention systems

Access Controls

  • Role-based access control (RBAC)
  • Multi-factor authentication (MFA) for all accounts
  • Single sign-on (SSO) support via SAML 2.0
  • Principle of least privilege
  • Regular access reviews

Application Security

  • Secure software development lifecycle (SDLC)
  • Code reviews and static analysis
  • Dependency vulnerability scanning
  • Regular security training for developers
  • Bug bounty programme

Monitoring & Incident Response

  • 24/7 security monitoring
  • Automated alerting and escalation
  • Documented incident response procedures
  • Regular incident response drills
  • Post-incident reviews and improvements

Business Continuity

  • Geographically distributed infrastructure
  • Automated failover capabilities
  • Regular backup and recovery testing
  • Disaster recovery planning
  • 99.9% uptime SLA

Vendor Security

We carefully vet all third-party vendors and subprocessors for security practices. Vendors must meet our security requirements and are subject to ongoing review.

Reporting Security Issues

If you discover a security vulnerability, please report it to security@cention.io. We appreciate responsible disclosure and will work with you to address issues promptly.

Back to Trust Center
cention.io

Agentic AI that acts, not just answers.

Stockholm | Kuala Lumpur

Product

Platform Use Cases Pricing Book a Demo

Company

About Us Blog Contact Trust Center

Legal

Privacy Policy Security Terms of Service GDPR
GDPR Compliant ISO 27001 SOC 2

© 2026 Cention.io. All rights reserved.