Peace of Mind with Eleveo: Security and Trust

Application, Data and Infrastructure Security in the Cloud

We know how critical Security and Compliance within the Eleveo products  are to you and your customers.  Our developers and engineers work diligently to ensure the security of your data and safeguard communication within and between Eleveo tools and components. Equally important, however, is the IT environment in which Eleveo is deployed.

 

Security Overview

Product Security

We take the security of our product very seriously. Our cloud offering is hosted on Amazon Web Services (AWS), which provides a secure, scalable, and reliable infrastructure for our product. In addition, we have implemented a number of security measures to protect customer data, including, but not limited to:

  • Data encryption both in transit and at rest 
  • Access controls to ensure that only authorized users can access customer data
  • Regular data backups and disaster recovery procedures to prevent data loss in the event of an unexpected event

Data Security

All customer data is encrypted both in transit and at rest, using industry-standard encryption protocols. We use AWS key management services to manage encryption keys and ensure secure access to customer data. Access controls are in place to ensure that only authorized users can access customer data.  We regularly audit access logs to identify any unauthorized access attempts. Data backups are taken on a regular basis and stored in a secure, off-site location to ensure that customer data is not lost in the event of a disaster. Every customer's instance is completely isolated, this minimizes the risk of data breaches.

Infrastructure Security

AWS provides secure, scalable, and reliable infrastructure for our application. We use AWS security services to protect our servers and network from unauthorized access attempts and DDoS attacks. We also use security monitoring tools to identify potential security threats and take appropriate action to mitigate any risks.

Application Security

We adhere to secure coding practices to ensure that our product is secure against potential vulnerabilities. We use a variety of security tools to identify potential security vulnerabilities and regularly test our product. We also use security testing tools to identify any potential threats and take appropriate measures to address any issues.

 

We also implement additional security measures to protect customer data, including, but not limited to:

  • Regular vulnerability scanning and penetration testing – We regularly scan our systems and applications for potential vulnerabilities and use penetration testing to identify any potential security issues.
  • Intrusion detection and prevention – We utilize security monitoring tools to identify potential security threats and take appropriate action to mitigate any risks. This includes monitoring for suspicious activity and taking action to prevent unauthorized access attempts.
  • Regular data backups and disaster recovery procedures – We take regular backups of customer data and store them in secure locations to ensuring that data can be restored in the event of a disaster or data loss.

Incident Response

We have a comprehensive incident response plan in place to detect and respond to security incidents. In the event of a security breach, we will notify customers as soon as possible and provide guidance on what actions they should take to protect their data.

Compliance

We comply with industry standards and regulatory requirements (such as GDPR) to ensure the privacy and security of customer data. We regularly review our security practices to ensure that we are in compliance with these regulations and obtain third-party audits and certifications to demonstrate our commitment to security. AWS is also compliant with many industry and regulatory requirements.

Security Audits 

 

Eleveo performs regular security screening, audits our internal processes, and performs vulnerability scans on a regular basis. 

These include, but are not limited to:

  • SOC2 assessment
  • AWS Foundational Security Best Practices
  • CIS Benchmark
  • OWASP ASVS Level 3
  • OWASP Top 10

Your Data and Eleveo Speech Generative AI

Eleveo does not share your data with third-party providers. The Speech Generative server is installed within the Eleveo private cloud, or on customer hardware. The generative AI model is a so-called ‘pre-trained’ data model. Recordings, transcriptions of recordings, and other related data are NOT used to improve the accuracy of the results or to train the model further. No customer data is shared or sent to an outside server or service for further processing. Please refer to the Eleveo Terms of Service or contact the Eleveo data protection contact person on how Eleveo handles customer data.

Security & Compliance at Eleveo

At Eleveo, safeguarding your data is a top priority. Our comprehensive suite of products is designed with built-in security features to help support your compliance requirements. While Eleveo software uses secure communication protocols within and across components, the overall security of your deployment also depends on the environment it's hosted in. Running Eleveo on a non-secure network may introduce the risk of data breaches.

 

To help you fully understand how Eleveo keeps your data secure—and what you can do to enhance that security—we’ve outlined key areas below.

Product Security

We take product security seriously. Eleveo’s cloud-based solutions are hosted on Amazon Web Services (AWS)—a trusted platform known for its secure, scalable, and resilient infrastructure. Our security measures include:

  • Data encryption in transit and at rest
  • Granular access controls to restrict data access to authorized users only
  • Regular backups and robust disaster recovery procedures

Data Security

Your data is protected at every step.

  • End-to-end encryption: We use industry-standard protocols to encrypt data both in transit and at rest.
  • Secure key management: AWS Key Management Services are used to handle encryption keys.
  • Isolated instances: Each customer operates in a fully isolated environment to prevent data crossover.
  • Access auditing: We regularly review access logs to detect and respond to any unauthorized attempts.
  • Reliable backups: Frequent backups are stored securely off-site to ensure data can be recovered in emergencies.

Infrastructure Security

Eleveo leverages AWS infrastructure to secure its systems against external threats:

  • Protection from DDoS attacks and unauthorized access using AWS-native security services
  • Continuous threat monitoring to detect and respond to risks in real time
  • Scalable, resilient architecture built to handle workloads securely and efficiently
  • Logging and Monitoring Application and system logging enabled on each server
  • Audit Trail CloudTrail, an AWS service, collects all API requests within the account and stores them in a separate audit account

Application Security

We follow best practices in secure software development to keep our applications protected:

  • Secure coding standards to prevent vulnerabilities
  • Automated and manual security testing throughout the development lifecycle
  • Ongoing vulnerability scanning and penetration testing
  • Intrusion detection and prevention systems (IDPS) to monitor for suspicious activity
  • Rapid response protocols to resolve identified issues

Incident Response

If a security incident occurs, we're ready. Eleveo has a defined Incident Response Plan to detect, contain, and remediate breaches. In the event of an incident:

  • We notify affected customers promptly
  • Provide guidance on how to protect your data
  • Take corrective action to prevent recurrence

Compliance

Eleveo adheres to global regulatory and industry standards to protect your privacy:

  • GDPR compliance
  • Support for industry frameworks like SOC 2, PCI DSS, and others
  • Ongoing audits and third-party assessments to ensure compliance and transparency

AWS, our cloud infrastructure provider, is also compliant with numerous certifications and regulatory requirements.

AI & Data Privacy: Eleveo Speech Generative AI

Staffing is a key influencer of contact center success. Obviously, you need to schedule agents correctly to ensure you entertain all customer inquiries. Eleveo’s call center software provides all the tools and features you need to closely manage your team, including:

Data Residency

Eleveo recognizes the valuable role that security auditing plays in regulatory compliance. We support data residency by region. This means that we support the deployment of the Eleveo Solution to AWS within (or as close to) the defined region preferred by the Customer.

The region of your deployment will be communicated to you before or during the project phase of your deployment. However, as AWS maintains a policy of not disclosing the specific location of their data centers (to ensure security for all customers), Eleveo is not able to determine exactly where (which data center) your data will be hosted. Given the distributed network of locations provided by AWS, Eleveo can only provide the region within which your data will be hosted.

This page provided a snapshot of Eleveo’s data storage, transfer, and security practices. Protecting your information is our highest priority, and we employ rigorous protocols to maintain its confidentiality, integrity, and availability. For an in-depth look at our security framework, please connect with your Eleveo Sales Director or request a consultation.

Want to learn how Eleveo can safeguard your data and ensure compliance?

Contact Us