Our security approach
At Browse AI, security is built into everything we do. Our infrastructure is designed with multiple layers of protection to ensure your data remains secure whether it's being transmitted, stored, or processed. We maintain SOC 2 Type 1 compliance and are actively working towards SOC 2 Type 2 certification.
For more information, please visit Browse AI Trust Center.
Data protection measures
Authentication and access
We use Auth0 to authenticate users and manage Browse AI account credentials.
Strict access controls limit who can view your robots and extracted data.
Our support team can only access your robots upon explicit request, with all actions monitored and logged.
Support staff cannot access encrypted inputs such as recorded passwords.
Infrastructure security
All services and databases are hosted in AWS US data centers.
We implement network segmentation to prevent unauthorized access.
Firewall protection and intrusion detection systems continuously monitor for threats.
Infrastructure performance monitoring generates alerts when specific thresholds are met.
Data encryption
TLS 1.2 encryption used for all data transmissions.
Sensitive customer data is encrypted at rest using industry-standard encryption.
Passwords entered during recordings are encrypted with AES-256 and only decrypted when needed on our secure servers.
You and your team members can never access decrypted sensitive inputs.
Monitoring and incident response
Continuous system monitoring for anomalies or unauthorized access attempts.
Dedicated security operations team with advanced monitoring tools.
Regular review of audit logs to ensure compliance with security policies.
Formal incident response plan with regular testing.
Protecting your sensitive information
When you record robots that require login credentials or other sensitive information:
Any passwords or sensitive data are encrypted immediately using AES-256.
Encrypted data is stored securely and only decrypted on our servers when running a task.
Neither you nor anyone on your team can access the decrypted values via the dashboard or API.
We ensure no sensitive information is ever included in our logs.
Privacy and compliance
We maintain a detailed Privacy Policy that outlines what information we collect and how it's processed and stored. For comprehensive information about our security practices, please visit our Trust Center.β