5-1

TRUST AND SECURITY

Your security is our top priority.

We adhere to comprehensive best practices and security principles to our platform to safeguard your data so that you can focus on what you do best: building high-stakes projects. 

Data Encryption

All data is encrypted both in transit and at rest using industry-standard encryption protocols, namely, TLS1.2+ for data in transit and AES-256 for data at rest, ensuring that your data is secure at all times.

Data Ownership and Access Control

Your data is yours

All data submitted to ALICE, as well as any data generated through the use of that data, is owned by you.

Strict access control

Role-based access controls ensure users are granted only the minimum necessary permissions to perform their work.

Data residency

Choose where your data lives. Select your data region with ALICE to stay in control and support compliance goals.

VALIDATED SECURITY CONTROLS
 
Security Compliance and Vulnerability Management

Validated controls in place ensuring continuous testing, monitoring, and protection against evolving threats. Visit our trust center to get the latest report and learn more about our proactive controls.

  • Annual third-party audits
  • Accredited penetration testing
  • Continuous internal audits and assessments, including an updated list of subprocessors
Warehouse (1)
21972-312_SOC_NonCPA

ALICE is SOC 2 Type II Compliant.

 RESILIENT BY DESIGN
 
Incident Response and Disaster Recovery

We maintain a well-documented incident response plan to detect, respond to, and contain security threats quickly and effectively. Read more in our policies here.

  • Rapid detection and response
  • Annual disaster recovery testing
  • Minimal disruption
tunnel-2
 SECURE BACKUP ARCHITECTURE
 
Data Backup and Redundancy

Ensuring you have uninterrupted access to your data.

  • Regular backups
  • Data stored in redundant locations
  • Infrastructure is built for high availability
Infrastructure
SECURITY ISN’T A CHECKBOX
Security is a continuous commitment at ALICE.

We proactively assess and enhance our practices with every update to ensure the platform remains secure and resilient.