Security Overview - Tecton

Tecton

Security Overview

Quote: "Tecton stands out as one of the most complete, enterprise-ready feature store platforms that can be incorporated into any ML infrastructure."
Quote: "Tecton stands out as one of the most complete, enterprise-ready feature store platforms that can be incorporated into any ML infrastructure."

– TheSequence Scope AI Newsletter

Tecton’s 4 Pillars of Security

1

Security designed to empower our customers

Most cloud solutions force you into a difficult trade-off: either trust a third party to manage your sensitive data, or keep the data in your control but take on expensive IT overhead. Tecton’s innovative hybrid deployment model separates your data from Tecton’s managed software, which gives you the agility of a SaaS product with the compliance and data ownership of an on-prem solution.

2

Commitment to innovation

Tecton provides a “built in the cloud, for the cloud” solution, which enables fast iteration and allows us to remain ahead of the curve in a rapidly changing industry. Our team is composed of veterans who built operational ML systems at companies such as Uber, Google, Facebook, Lyft, and Airbnb. This expertise has led to state-of-the-art security and privacy controls across our product—and we’re determined to push the state-of-the-art even further.

3

Zero trust infrastructure

Tecton is built on the Zero Trust Infrastructure principle to keep customer data secure and protected. Secure authentication is required to access all components of Tecton’s product. This is enforced for both user-level access to the product as well support-level access to the infrastructure.

4

Trust through transparency

As a fast-growing company, we’re committed to gaining our customers’ trust through transparency and ownership of data. Tecton’s architecture is designed to maximize your control over your data, logging, and monitoring and give you visibility into Tecton’s infrastructure.

Security Domains

Security and Compliance at Tecton targets 3 key areas:

 

  • Tecton Internal Security
  • Managed Service Security
  • Tecton Product Security

 

These areas are covered in depth by our Security & Compliance Whitepaper

A diagram demonstrating the relationship between Tecton Internal Security and Tecton Product Security
Print

SOC 2 Type 2 Compliance

Tecton is SOC 2 Type 2 compliant. SOC 2 defines  controls for managing data and privacy based on a set of principles approved by the AICPA. SOC 2 Type 2 is a regularly refreshed report issued by an external auditor that attests to Tecton’s implementation and adherence to these controls over a sustained period of time. Tecton’s SOC 2 Type 2 report is available upon request.

Quote: "Tecton has taken one of the most difficult services for CISOs and DPOs to get comfort around (ML) and built a solution that enables security, privacy, and compliance for all industries."
Quote: "Tecton has taken one of the most difficult services for CISOs and DPOs to get comfort around (ML) and built a solution that enables security, privacy, and compliance for all industries."

– Josef Fukano, Managing Director at Hilltop GRCC, Former Director of Compliance at Box

Tecton Security & Compliance Whitepaper

Get your models to production

Sign up for the latest from Tecton

Get all the newest content from Tecton directly to your inbox



Contact us

info@tecton.ai 548 Market St San Francisco, CA 94104

Tecton is growing.

Help us build the future of ML.

© Tecton, Inc. All rights reserved. Various trademarks held by their respective owners.

Privacy and Terms

Request a free trial

Interested in trying Tecton? Leave us your information below and we’ll be in touch.​

Request a free trial

Interested in trying Tecton? Leave us your information below and we’ll be in touch.​