Skip to main content
Awareness SecurityAwareness Security

Trust Center

Transparency builds trust. Learn how we protect your data, ensure human oversight, and maintain the highest security standards.

Our Commitments

Six foundational promises that guide how we handle your data and conduct security assessments.

Local AI Processing

All AI-assisted analysis is performed on controlled, local infrastructure. No sensitive data is sent to external AI providers. Your vulnerabilities never leave our environment.

Data Stays in Norway

All data is stored and processed on servers in Norway. No data is transferred to external cloud providers or third-party AI services.

End-to-End Encryption

All credentials and sensitive data are encrypted with AES-256-GCM. Data in transit is protected with TLS 1.3.

Right to Deletion

Request complete deletion of your data at any time. We process deletion requests within 24 hours.

Human-in-Control

No AI action happens without human approval. Every test plan, finding, and report is validated by certified security professionals.

Clear Liability

We carry professional liability insurance and take full responsibility for any damage caused during authorized testing.

Human-in-Control Process

Our four-gate system ensures that humans approve every critical decision. AI assists with efficiency, but humans remain in control.

0

Gate 0: Authorization

Customer defines scope and digitally signs authorization for testing.

Customer approval required
1

Gate 1: Attack Plan

AI generates attack plan based on scope. Security analyst reviews and approves before execution.

Analyst approval required
2

Gate 2: Validation

All findings are manually validated by security experts to eliminate false positives.

Human verification of every finding
3

Gate 3: Delivery

Report is reviewed and enhanced by analysts before delivery to customer.

Human quality assurance

AI does the heavy lifting. Humans make the decisions.

Data Handling Principles

How we handle your data during security assessments.

Data Stays Local

  • All data processed on controlled infrastructure in Norway
  • No external AI providers used for sensitive analysis
  • No storage outside controlled systems

What We Do NOT Do

Clear commitments about what we never do with your data:

  • We do not send your data to OpenAI
  • We do not use cloud-based AI for vulnerability data
  • We do not expose findings to third-party systems

Data Retention Policy

Data TypeRetention Period
Final Report12 months, then deleted
Raw Test Data30 days after engagement
Test CredentialsDeleted immediately after engagement
Audit LogsAnonymized after 90 days

Frequently Asked Questions

Answers to common concerns about AI-assisted security testing.

Do you use OpenAI or other external AI providers?

No. We do not use OpenAI, Google, Anthropic, or any other external AI provider for processing sensitive customer data. All analysis is performed locally on controlled infrastructure. No vulnerability data, credentials, or findings ever leave our environment.

Is my data used to train AI models?

No. All AI processing happens locally on our controlled infrastructure. Your data never reaches external AI providers, so there is no possibility of it being used for model training. Your sensitive business data, source code, and vulnerability information stays entirely within our controlled environment.

What if the AI damages my systems?

Our Human-in-Control approach means no action is taken without analyst approval. We test against designated test environments, follow strict scope boundaries, and carry professional liability insurance. If anything goes wrong during authorized testing, we take full responsibility.

Who has access to the vulnerabilities found?

Only the assigned security analyst and necessary quality assurance personnel. All findings are encrypted at rest, and we conduct background checks on all employees. We provide NDA before engagement if required, and we never report findings to authorities or third parties without your explicit consent.

Is AI as good as human pentesters?

AI and humans have complementary strengths. AI excels at systematic testing, consistent methodology, and complete documentation. Humans excel at creative attack vectors, business logic flaws, and contextual understanding. Our Human-in-Control approach gives you the best of both: AI efficiency with human judgement.

This is new technology - how mature is it?

Our platform combines established AI capabilities with proven security testing methodologies. Every engagement benefits from human oversight at critical gates. We're transparent about capabilities and limitations, and our gate system ensures quality regardless of AI output.

Will the report satisfy compliance requirements?

Yes. Our reports meet requirements for ISO 27001, PCI-DSS, SOC 2, and GDPR security testing. All findings are human-validated, not raw AI output. We follow OWASP, PTES, and industry-standard methodologies, and reports can be attested by our certified security professionals.

Our Guarantees

Written commitments included in every engagement contract.

No Data Leakage

Contractual liability if we leak your data

Local AI Processing

All analysis on controlled infrastructure

No External AI Providers

No data sent to OpenAI, Google, or others

Deletion on Request

Within 24 hours of request

Norwegian Support

Always available in Norwegian

Ready to Get Started?

Contact us to discuss your security needs or learn more about our approach.