
Trust & Compliance
Our Commitment to Your Security
Your Risk Is Our Risk — Literally
Built with protection at its core, our At-Bay’s Stance solutions safeguard your data and workflows using the same industry-leading practices that protect Fortune 500 companies.
But here's what sets us apart: if our security fails, we look for coverage for your loss under your At-Bay policy. This shared-risk model means your protection directly impacts our bottom line, transforming the typical vendor relationship into true partnership. That's security that works — because it has to.

SOC 2 Type II Certified
At-Bay has earned SOC 2 Type II certification through rigorous independent auditing that validates the design and effectiveness of our security controls. Real protection, verified.
Request full reportBattle-Tested by Us First
Our own business operations are protected by the exact same solutions we provide to our clients. When we say our solutions work, we know firsthand — they are protecting our own data, people, and reputation 24x7.

Frequently Asked Questions
-
Is all data encrypted both in transit and at rest?
Yes, all data is fully encrypted both in transit and at rest, ensuring confidentiality and protection at every stage.
Read More -
Are you retaining data on servers in other countries?
No, data is processed and stored exclusively in AWS data centers located in the United States.
Read More -
Is any mailbox or threat data stored or logged outside our tenant?
Yes, mailbox and threat data are processed and logged securely in our US-based AWS environment, outside of your tenant.
Read More -
Are you using data from our environment to train AI models?
No, we do not use customer data for training as-is. However, in case we find attacks, we may use the data created by malicious threat actors to to train our models.
Read More -
Is access to logged or processed data internally restricted based on role or need-to-know?
Yes, access is strictly limited to the Cyber Research team and is governed by the principle of least privilege.
Read More -
Do you maintain audit logs of access and actions, and support formal incident response procedures?
Yes, all access and actions are logged. We maintain comprehensive audit trails and adhere to SOC 2 compliance standards, including formal incident response procedures.
Read More
Additional Resources
Security Inquiries: security@at-bay.com
Legal & Privacy Questions: privacy@at-bay.com


