– TheSequence Scope AI Newsletter
Security designed to empower our customers
Most cloud solutions force you into a difficult trade-off: either trust a third party to manage your sensitive data, or keep the data in your control but take on expensive IT overhead. Tecton’s innovative hybrid deployment model separates your data from Tecton’s managed software, which gives you the agility of a SaaS product with the compliance and data ownership of an on-prem solution.
Commitment to innovation
Tecton provides a “built in the cloud, for the cloud” solution, which enables fast iteration and allows us to remain ahead of the curve in a rapidly changing industry. Our team is composed of veterans who built operational ML systems at companies such as Uber, Google, Facebook, Lyft, and Airbnb. This expertise has led to state-of-the-art security and privacy controls across our product—and we’re determined to push the state-of-the-art even further.
Zero trust infrastructure
Tecton is built on the Zero Trust Infrastructure principle to keep customer data secure and protected. Secure authentication is required to access all components of Tecton’s product. This is enforced for both user-level access to the product as well support-level access to the infrastructure.
Trust through transparency
As a fast-growing company, we’re committed to gaining our customers’ trust through transparency and ownership of data. Tecton’s architecture is designed to maximize your control over your data, logging, and monitoring and give you visibility into Tecton’s infrastructure.
Security and Compliance at Tecton targets 3 key areas:
- Tecton Internal Security
- Managed Service Security
- Tecton Product Security
These areas are covered in depth by our Security & Compliance Whitepaper
– Josef Fukano, Managing Director at Hilltop GRCC, Former Director of Compliance at Box
Tecton Security & Compliance Whitepaper
Sign up for the latest from Tecton
Get all the newest content from Tecton directly to your inbox