Privacy and Security
Key Business Use Cases: Privacy & Security
S
Secure multi-system integrations without credential exposure
GSX enables organizations to connect AI agents with critical third-party systems (e.g., Salesforce, Office 365, Snowflake) without exposing credentials to end users or unauthorized staff. Use cases include securely enabling sales agents to update CRM records, automating HR workflows across internal systems, and others.
R
Regulatory compliance and data protection in sensitive industries
Data governance capabilities—including AES-256 encryption at rest, TLS 1.2 in transit, customizable retention policies, and granular role-based access—equip organizations to comply with multiple frameworks (GDPR, HIPAA, CCPA, SOC 2, etc.).
E
Enterprise-grade privacy controls for conversational data
GSX allows enterprises to implement strict identity-aware privacy strategies, ensuring sensitive information is tightly controlled across global operations. Use cases include financial service providers creating conversations where account numbers are redacted from records or healthcare providers muting sensitive information to preserve patient privacy.
Privacy
Encrypted data at rest and in transit
All data whether in transit or at rest is encrypted. During transit we use TLS 1.2 and at rest we use AES-256 bit encryption. Data retention policies can be customized at the PDE level, so customers have full control and ability to customize data storage as fits their use cases.
Least access rights
For privacy compliance we make sure that only certain people have access to certain environments based on their role. Roles-based privilege can be determined differently on a per-customer basis.
Provider flows
These are Flows that contain credentials to third party systems. Regular Flows that call these systems (e.g. Salesforce) have an authentication step that does not reveal any system-level authentication credentials; those are obfuscated by the Provider Flows, thus preventing the wrong people from having access to that information.
Masking PII
We can redact PII in live conversations and generated transcripts using traditional redaction NLP, regex, and LLMs. We can also mute recordings and their corresponding transcripts on an utterance by utterance basis via our native voice stack.
Security
Security overview
OneReach.ai works with customers with the strictest data security and compliance requirements including those from the medical, insurance, and government industries. If there are specific security or compliance needs we can customize the account to match your specifications.
Security certifications
GDPR
AICPA SOC 2/audit
CAN-SPAM
CCPA
CASL
HIPAA
End user authentication support
Voice biometrics, Device biometrics, MFA, Silent Auth, Active Directory (Azure AD), AWS SSO, Duo SSO, Adaptive SSO, LastPass SSO, LDAP, OAuth2, Okta SSO, OneLogin SSO, OpenID Connect, RSA SecurID, SecureAuth Identity Platform, Symantec VIP Access
Security documentation
Since OneReach.ai offers Private Dedicated Environments with hyper-personalized client security, we have both robust security documentation and security professionals on staff to support any security needs the client may have.
Secure data access
Private multi-tenant architecture ensures that while resources are shared, data access remains secure and compliant with organizational policies and regulations. Sensitive information is safeguarded, and access is strictly controlled based on roles and needs. Each team operates within its own private tenant space, ensuring that their development activities and data are isolated from others. This separation is crucial for security, privacy, and preventing unintended interactions between different AI skills.
Compliance
PII masking
Support to anonymization/obfuscation/masking of sensitive data such as personally identifiable information, protected health information or payment card information by appropriate data security means such as redaction, tokenization, encryption or a similar approach.
Secured financial transactions
Secure customer identification and tracking.
Access Controls
Least access rights
For privacy compliance we make sure that only certain people have access to certain environments based on their role. Roles-based privilege can be determined differently on a per-customer basis.
Hyper-customized access control
Solution access can be configured in multiple ways based on the solution that is designed, configured and implemented on the OneReach.ai platform. We have supported everything from ID/Password, multiple SSO implementations, PIN/Passcodes, biometrics, etc.
Departmental access management
Each department has control over its domain of knowledge. GSX provides access management that reflects organizational structures and permissions accurately. For example, HR policies should be managed by HR professionals, not by team members in Sales. Similarly, pricing information should be under the purview of relevant financial or sales departments.
GUI admin controls
OneReach.ai has a built in advanced admin controls GUI for all aspects of the platform. User roles and configurations are all easily managed and governed from simple GUIs within the “Action Desk” module of the OneReach.ai platform. As an additional access control, each flow offers unique password protection in addition to standard role assignment.