Security Policy

We take security very seriously and have developed a comprehensive set of practices, technologies and policies to help ensure your data is secure.


Security is essential in working with customers’ information, aisite is built on effective and security-focused practices. We have implemented everything we know to endure your business data is protected. aisite security is grouped in 4 different areas:


Physical Security; Network Security; People Processes and Business Continuity.


We use AWS and Namecheap, do we need to say more really ! They have every conceivable security feature, so far.

In terms of our office – we sport high-security video-monitored perimeter. Entry via keypad and key. Monitored alarm service in place.  Surveillance cameras for 24/7 monitoring of access routes. We are protected from physical and logical attacks, and from natural disasters such as fires or floods. We are quite protected from Covid as well given our lucky place on the planet in general. Our network security team protects your data, and ours, against the most sophisticated modern cyber attacks, and we have had many.

We use the best and proven practices of network and application security. aisite offers the following preventive measures:
network firewalls, DDoS preventions (We use the latest hardware appliances and sophisticated perimeter security technologies, providing you with first-rate protection against large-scale DDoS attacks). Constant reviews are made of Network Posture and Risk Assessment.

Application Security Layer

Our service provides you with HTTPS-encrypted communication, role-based authorization, and validation of all requests to ensure the security on the application level. Security Audits On a regular basis, we scan all systems to prevent any vulnerabilities.

Our software and AI is constantly updated, so all connections to the previous version are limited, logged and checked. We absolutely comply with your confidentiality and guarantee that all your CMS data is 100% secure before, during, and after migration procedure. We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, as well as physical security measures to guard against unauthorized access to systems where we store personal data.

We have numerous security points but it would be kind of silly to detail them all here !


Read more at: