Complimentary Gartner Report: "Assess 5 AI Agent Market Categories"

Download Report

Home > GSX Platform > Privacy and Security
Menu

    Privacy and Security

    Key Business Use Cases: Privacy & Security

    S

    Secure multi-system integrations without credential exposure

    GSX enables organizations to connect AI agents with critical third-party systems (e.g., Salesforce, Office 365, Snowflake) without exposing credentials to end users or unauthorized staff. Use cases include securely enabling sales agents to update CRM records, automating HR workflows across internal systems, and others.

    R

    Regulatory compliance and data protection in sensitive industries

    Data governance capabilities—including AES-256 encryption at rest, TLS 1.2 in transit, customizable retention policies, and granular role-based access—equip organizations to comply with multiple frameworks (GDPR, HIPAA, CCPA, SOC 2, etc.).

    E

    Enterprise-grade privacy controls for conversational data

    GSX allows enterprises to implement strict identity-aware privacy strategies, ensuring sensitive information is tightly controlled across global operations. Use cases include financial service providers creating conversations where account numbers are redacted from records or healthcare providers muting sensitive information to preserve patient privacy.

    Privacy

    Encrypted data at rest and in transit
    All data whether in transit or at rest is encrypted. During transit we use TLS 1.2 and at rest we use AES-256 bit encryption. Data retention policies can be customized at the PDE level, so customers have full control and ability to customize data storage as fits their use cases.

    Least access rights
    For privacy compliance we make sure that only certain people have access to certain environments based on their role. Roles-based privilege can be determined differently on a per-customer basis.

    Provider flows
    These are Flows that contain credentials to third party systems. Regular Flows that call these systems (e.g. Salesforce) have an authentication step that does not reveal any system-level authentication credentials; those are obfuscated by the Provider Flows, thus preventing the wrong people from having access to that information.

    Masking PII
    We can redact PII in live conversations and generated transcripts using traditional redaction NLP, regex, and LLMs. We can also mute recordings and their corresponding transcripts on an utterance by utterance basis via our native voice stack.

    Security

    Security overview
    OneReach.ai works with customers with the strictest data security and compliance requirements including those from the medical, insurance, and government industries. If there are specific security or compliance needs we can customize the account to match your specifications.

    Security certifications
    GDPR
    AICPA SOC 2/audit
    CAN-SPAM
    CCPA
    CASL
    HIPAA

    End user authentication support
    Voice biometrics, Device biometrics, MFA, Silent Auth, Active Directory (Azure AD), AWS SSO, Duo SSO, Adaptive SSO, LastPass SSO, LDAP, OAuth2, Okta SSO, OneLogin SSO, OpenID Connect, RSA SecurID, SecureAuth Identity Platform, Symantec VIP Access

    Security documentation
    Since OneReach.ai offers Private Dedicated Environments with hyper-personalized client security, we have both robust security documentation and security professionals on staff to support any security needs the client may have.

    Secure data access
    Private multi-tenant architecture ensures that while resources are shared, data access remains secure and compliant with organizational policies and regulations. Sensitive information is safeguarded, and access is strictly controlled based on roles and needs. Each team operates within its own private tenant space, ensuring that their development activities and data are isolated from others. This separation is crucial for security, privacy, and preventing unintended interactions between different AI skills.

    Compliance

    PII masking
    Support to anonymization/obfuscation/masking of sensitive data such as personally identifiable information, protected health information or payment card information by appropriate data security means such as redaction, tokenization, encryption or a similar approach.

    Secured financial transactions
    Secure customer identification and tracking.

    Access Controls

    ​​Least access rights
    For privacy compliance we make sure that only certain people have access to certain environments based on their role. Roles-based privilege can be determined differently on a per-customer basis.

    Hyper-customized access control
    Solution access can be configured in multiple ways based on the solution that is designed, configured and implemented on the OneReach.ai platform. We have supported everything from ID/Password, multiple SSO implementations, PIN/Passcodes, biometrics, etc.

    Departmental access management
    Each department has control over its domain of knowledge. GSX provides access management that reflects organizational structures and permissions accurately. For example, HR policies should be managed by HR professionals, not by team members in Sales. Similarly, pricing information should be under the purview of relevant financial or sales departments.

    GUI admin controls
    OneReach.ai has a built in advanced admin controls GUI for all aspects of the platform. User roles and configurations are all easily managed and governed from simple GUIs within the “Action Desk” module of the OneReach.ai platform. As an additional access control, each flow offers unique password protection in addition to standard role assignment.

    Contact Us

    loader

    Contact Us

    loader