Sophisticated Automation
Absolute Peace of Mind
Trust is the foundation of healthcare. Our platform is engineered to mirror your strictest protocols, ensuring every interaction is secure, compliant, and transparent—allowing your team to focus on patients, while we protect the data.
Infrastructure Security
NVIDIA-Certified Hardware: Services are hosted on NVIDIA-Certified Systems™, specifically optimized for the high-security and performance demands of enterprise AI workloads.
Google Cloud Platform (GCP) & BAA: Our infrastructure is hosted on Google Cloud Platform (GCP). We maintain a signed Business Associate Agreement (BAA) with Google, ensuring that all underlying cloud services comply with HIPAA standards for the protection of electronic Protected Health Information (ePHI).
Hardware-Backed Isolation: Perseptex leverages Trusted Execution Environments (TEEs) to block unauthorized access from infrastructure owners or privileged users.
Multi-Factor Authentication (MFA): We enforce MFA and Single Sign-On (SSO) for all critical infrastructure access points.
Product Security
Secure Development Lifecycle (SDLC): Security is integrated into every stage of development, including mandatory peer reviews, static analysis (SAST), and dynamic analysis (DAST).
Cryptographic Integrity: We use cryptographically signed container and model images to ensure that only authorized, untampered code is executed within our production environment.
Vulnerability Management: Our platform undergoes daily automated vulnerability scans and internal security audits to proactively identify, track, and remediate technical risks.
Explainable AI Decisions: Every action taken by our AI agents is recorded in an immutable audit trail, providing transparent and auditable decision-making logs for clinical and regulatory review.
Redaction Guardrails: Proprietary automated redaction layers filter sensitive information (PHI/PII) in real-time before data is processed by Large Language Models (LLMs).
Compliance

Documents

Data Privacy & Sovereignty
End-to-End Encryption: All data is protected by AES-256 encryption at rest and TLS 1.3 (or higher) encryption in transit.
Regulatory Alignment: Our framework is purpose-built to meet the rigorous requirements of HIPAA, SOC 2 Type II, and GDPR.
Data Minimization: We adhere to strict data minimization principles, collecting, processing, and retaining only the information strictly necessary to perform defined tasks.
Advanced De-identification: We utilize state-of-the-art anonymization techniques to protect patient and user identities before data undergoes AI processing.
Sovereignty & Deletion: We offer regional data residency options and enforced data deletion schedules to comply with institutional and geographic storage mandates.
Organizational & Internal Security
Vetted Personnel: All employees with access to production environments must pass comprehensive background checks and regular security screenings.
Continuous Security Training: Staff undergo mandatory monthly security awareness training, including phishing simulations, data privacy education, and HIPAA compliance refreshes.
BAA & Confidentiality: Every team member and contractor is required to sign strict Confidentiality Agreements and Business Associate Agreements (BAAs) where applicable.
Principle of Least Privilege: System access is granted on a “need-to-know” basis, restricted to authorized personnel specifically required for their job functions.
Tested Incident Response: We maintain a comprehensive Incident Response Plan that is regularly tested through tabletop simulations and functional exercises.
Configuration Baseline: We use centralized configuration management systems to ensure all servers and services meet our strict security baselines at all times.


