Triple-Layer Protection
Just as the mythological Cerberus guarded with three heads, Cerbite protects your data with three independent layers of security. Each layer operates independently, so compromising one does not compromise the others.
End-to-End Encryption
All meeting data is encrypted using AES-256 at rest and TLS 1.3 in transit. Your transcriptions and notes are encrypted before they leave your device and can only be decrypted by you.
Zero-Knowledge Architecture
We cannot read your meeting content. Encryption keys are derived from your credentials and never stored on our servers. Even in the event of a breach, your data remains unreadable.
Biometric Access
Protect your Cerbite account with Face ID, Touch ID, or fingerprint authentication. Add an additional layer of security beyond your password for sensitive meeting data.
Security Practices
Infrastructure Security
- Hosted on SOC 2 Type II certified cloud infrastructure
- Network-level firewalls and intrusion detection systems
- Automated vulnerability scanning and patching
- Geographically distributed redundant backups
- DDoS protection and rate limiting
Operational Security
- Role-based access controls with least-privilege principle
- Comprehensive audit logging for all data access
- Regular third-party penetration testing
- Employee security awareness training
- Incident response plan with 72-hour notification
Compliance
- GDPR compliant for EEA and UK users
- CCPA/CPRA compliant for California residents
- SOC 2 Type II audit in progress
- Data Processing Agreements available for enterprise
- Regular compliance reviews and updates
Report a Vulnerability
We take security reports seriously. If you discover a vulnerability, please report it responsibly to support@ai-invest.vc with the subject "Security Report". We commit to acknowledging reports within 24 hours and resolving critical issues within 72 hours.