Detailed information regarding security, monitoring and encryption. - artificial


Nothing is more important to us than your security. Sensitive data deserves world-class monitoring, strict access controls and high-level encryption. At Artificial, we’re serious about giving your business peace of mind.

HTTPS for Secure Connections

All traffic between our APIs and client-facing applications is encrypted and served over HTTPS (enforced with HSTS) using the strongest TLS security policies. We also submit all of our applications to external penetration testing, so you can trust your data is safe.

Access Control Lists

We deploy group-based and role-based access control policies for data access on both the infrastructure and application level. We also keep a full audit log of administrative and user access.

Encryption of Sensitive Data

All sensitive data in our applications is encrypted at rest using AES-256 Ciphers. We only keep sensitive data on privately accessible servers, never public.

Alerting & Monitoring

Our applications are monitored and alerts are automatically triggered if something looks out of the ordinary. This tells us if there's a problem, so you don't have to.

Infrastructure Isolation and Protection

Each of our applications is deployed within the AWS Cloud and is isolated on its own resources - within its own account and inside its own VPC. Sensitive resources, such as databases, are only able to communicate through private connections and are not available for access on the outside internet.


10 Bow Lane



United Kingdom

020 3880 8461

Koszykowa 61