Security at Xylo AI
Xylo AI is a cutting-edge AI-powered platform designed to deliver intelligent automation and insights to businesses of all sizes. The Xylo AI product is designed, developed, operated, and supported by our team of dedicated engineers and security professionals. We’ve architected Xylo AI to exceed the most demanding security standards, ensuring your data remains private, protected, and available—so you can innovate with confidence.
The AI Trust Promise
Your data belongs to you. Period. We know the biggest risk in AI is data leakage. That’s why we’ve built our platform with a "Privacy First" architecture.
No Public Training: We strictly do not use your proprietary data to train our public foundation models.
Logical Isolation: Your workflows and insights are logically isolated in our multi-tenant environment.
Data Sovereignty: You retain full ownership and control of your data inputs and outputs.
World-Class Infrastructure
Powered by Google Cloud Platform (GCP) Xylo AI is hosted on the same infrastructure that powers Google’s own services. By leveraging GCP, we provide you with military-grade physical security and global reliability from day one.
Global Compliance: Our infrastructure is accredited for ISO 27001, SOC 1/2/3, PCI DSS Level 1, and FedRAMP.
Physical Defense: Your data lives in data centers protected by biometric identification, metal detection, and 24/7 professional security staff.
Resilience: Redundant power, cooling, and network systems ensure that Xylo AI is online whenever you need it.
Data Protection & Privacy
Encryption
We protect your data at every stage of its lifecycle.
In Transit: All data moving between you and Xylo AI is encrypted via TLS 1.3 (HTTPS).
At Rest: We utilize AES-256 encryption for all data stored on our servers.
Access Control
We ensure that only the right people have access to the right data.
Multi-Factor Authentication (MFA): Add an extra layer of protection to your user accounts.
Session Protection: Configurable auto-logouts keep your account safe, even if you step away from your desk.
Reliability & Monitoring
Always On, Always Watching
We protect your data at every stage of its lifecycle.
24/7 Threat Detection: We utilize Google Cloud Security Command Center to monitor for threats, vulnerabilities, and misconfigurations in real-time.
DDoS Protection: Our network is shielded by Google Cloud Armor, defending your workspace against denial-of-service attacks.
Disaster Recovery: Your data is backed up daily and replicated across multiple geographic zones, allowing us to restore service quickly in the event of a system-wide emergency.
