Security

Inspired by Cerberus, Cerbite's triple-layer security model guards your meeting data.

Triple-Layer Protection

Just as the mythological Cerberus guarded with three heads, Cerbite protects your data with three independent layers of security. Each layer operates independently, so compromising one does not compromise the others.

End-to-End Encryption

All meeting data is encrypted using AES-256 at rest and TLS 1.3 in transit. Your transcriptions and notes are encrypted before they leave your device and can only be decrypted by you.

Zero-Knowledge Architecture

We cannot read your meeting content. Encryption keys are derived from your credentials and never stored on our servers. Even in the event of a breach, your data remains unreadable.

Biometric Access

Protect your Cerbite account with Face ID, Touch ID, or fingerprint authentication. Add an additional layer of security beyond your password for sensitive meeting data.

Security Practices

Infrastructure Security

  • Hosted on SOC 2 Type II certified cloud infrastructure
  • Network-level firewalls and intrusion detection systems
  • Automated vulnerability scanning and patching
  • Geographically distributed redundant backups
  • DDoS protection and rate limiting

Operational Security

  • Role-based access controls with least-privilege principle
  • Comprehensive audit logging for all data access
  • Regular third-party penetration testing
  • Employee security awareness training
  • Incident response plan with 72-hour notification

Compliance

  • GDPR compliant for EEA and UK users
  • CCPA/CPRA compliant for California residents
  • SOC 2 Type II audit in progress
  • Data Processing Agreements available for enterprise
  • Regular compliance reviews and updates

Report a Vulnerability

We take security reports seriously. If you discover a vulnerability, please report it responsibly to support@ai-invest.vc with the subject "Security Report". We commit to acknowledging reports within 24 hours and resolving critical issues within 72 hours.