Drive to Reimagine

Engage your customers at scale with these security measures

Engati Team
.
Sep 8
.
4-5 mins

Table of contents

Automate your business at $5/day with Engati

REQUEST A DEMO
Engage your customers at scale without security concerns

You want to scale up and automate your customer engagements, but you're worried. You wish you could answer all your customer questions 24/7, but you're concerned about chatbot security and are wondering about the security protocols that are followed to protect your data.

This article will help alleviate your security concerns.

Governments, banks, and other organizations with extreme data security concerns use Engati to scale their customer engagements worldwide . Here are a few of the precautions that we take to eliminate security risks and protect their data and yours.

What security measures can a business implement in order to ensure a chatbot is safe for its customers?

Hosting

Our database servers are securely configured and not accessible outside the demilitarized zone.

Even though we use a multi-tenant system, your data is always logically separated from another customer’s data.

For website bots, the same connection where requests are received is the one over which responses are sent back. We have also implemented additional logic to protect you from data leaks and session hijacking. The server even drops off any and all spurious connections.

Our bot platform does not save any end-user’s personally identifiable information or location information unless specifically enabled from the platform. 

While building your bot, you are also encouraged to only ask your customers for details that you absolutely require. We also urge you to provide details about how the system consumes the data in a transparent manner.


Infrastructure security

We have set up strong firewalls to protect the network and infrastructure from unauthorized access and attacks.

We even ensured that no backend functional services are exposed to the internet, and all calls go through specific checks on limited ports.

Your backup files are also stored in a separate location with different layers of security.

We have restricted physical access to the data storage through multi-factor access control, using a combination of network, certificate access, and password protection.

You can use third-party infrastructure monitoring tools to collect performance data from backend components, like servers, virtual machines, and databases.

Encryption

All data transmission between the web browser client and the server is done only over SSL encrypted channels.

All sensitive data is stored only in encrypted files.

Application user credentials (for the portal) are all stored in salted hashed form.


Periodical assessments

We conduct a monthly security-focused code review on the entire platform.

All potential threat scenarios are modeled and outlined from a design perspective on a monthly basis.

Our team performs a black box security assessment on all applications before a release. In a worst-case scenario, we carry out these assessments quarterly.

We also conduct network security assessments at regular intervals on all our production servers.


Compliances

1

GDPR

The GDPR or General Data Protection Regulation is a regulation concerning data protection and privacy for the European Union.

Here are a few of the measures that we take in compliance with the GDPR:

  • We only store information that is necessary for business and delete the rest.
  • To figure out who can use customer data and negate all risks, we identify where all our data comes from.
  • We adopt effective security measures and lodge barriers against data breaches
  • We ensure that personal data is always anonymized and encrypted.
  • Engati’s data protection capabilities are integrated to mitigate risks across all channels.
2

ISO 27001

ISO/IEC 27001 sets the international standard for creating, implementing, maintaining, and continuously improving an information security management system (ISMS). 

As an ISO 27001 certified organization, we have sturdy security-focused controls in place under these areas:

  • Asset managementIncluding audits, access controls, removal or destruction of assets
  • Physical and environmental securityWe have several policies and procedures to safeguard access to organization premises, hardware, software, data, etc.
  • Operation securityThis includes backups/restore mechanisms, roles/responsibilities, logging and monitoring, vulnerability assessment, and management.
  • Incident ManagementEngati has robust incident management guidelines in place with a severity-based chain of command, communication frequency, and associated details.
  • BCP and DRBusiness Continuity guidelines in place along with detailed DR plans for various grades of impact

Miscellaneous

Conversation data from third-party sources is always validated for data integrity before being consumed.

Idle time validation is enforced for all bot user-workflow interactions.

Relevant security headers are set in place, and strong session management is enforced to prevent session hijacking.

Proper cookie-based authentication & authorization mechanisms have been implemented to protect user’s from insecure direct object reference.

Our backend framework protects the web application and its resources from cross-site scripting, cross-site request forgery and injections.

Individual portal users can only have one active session at a time. In addition to this, users are logged out of the portal after 30 minutes of inactivity, and password recovery links are only valid for 15 minutes after you request them.

Certain organizations with highly sensitive information (like government organizations and banks) cannot have their systems based entirely on the cloud. They can use our C2E (Cloud to Enterprise) Bridge for a hybrid solution in such situations.

It empowers organizations to work with a combination of on-premise environments along with Engati’s services. The C2E Bridge makes it possible for you to flow between these environments enabling greater flexibility and productivity in a secure manner.

Engati is also secure and protected against the Open Web Application Security Project (OWASP) Top 10 web application security risks.

In addition to this, all of Engati’s portal workflows are associated with user roles. Only authorized portal users are granted access to these workflows based on the configuration.

So, what are you waiting for? Start engaging your customers 24/7, without the slightest delay, in a safe manner.

Engati Team

At the forefront for digital customer experience, Engati helps you reimagine the customer journey through engagement-first solutions, spanning automation and live chat.

Close Icon
Request a Demo!
Get started on Engati with the help of a personalised demo.
Thanks for the information.
We will be shortly getting in touch with you.
Oops! something went wrong!
For any query reach out to us on contact@engati.com
Close Icon
Congratulations! Your demo is recorded.

Select an option on how Engati can help you.

I am looking for a conversational AI engagement solution for the web and other channels.

I would like for a conversational AI engagement solution for WhatsApp as the primary channel

I am an e-commerce store with Shopify. I am looking for a conversational AI engagement solution for my business

I am looking to partner with Engati to build conversational AI solutions for other businesses

continue
Finish
Close Icon
You're a step away from building your Al chatbot

How many customers do you expect to engage in a month?

Less Than 2000

2000-5000

More than 5000

Finish
Close Icon
Thanks for the information.

We will be shortly getting in touch with you.

Close Icon

Contact Us

Please fill in your details and we will contact you shortly.

Thanks for the information.
We will be shortly getting in touch with you.
Oops! Looks like there is a problem.
Never mind, drop us a mail at contact@engati.com