top of page

Security Features

At Wilty, security is a core pillar of our platform.

 

Our solution is designed to help businesses navigate the risks posed by synthetic media, including both deepfakes and shallowfakes.

 

With enterprise-grade encryption, robust data protection measures, and flexible deployment options, Wilty AI ensures your sensitive information remains secure.

 

By combining cutting-edge technology with industry-leading safeguards, we provide the confidence needed to address emerging challenges in digital media integrity.

SECURE SOURCE CODE

image.png

Code is stored in secure version controlled platforms and can only be accessed by specific IP restricted user accounts which have MFA enabled

image.png

Databases are stored in industry standard databases by default and can only be accessed by specific IP restricted users with MFA enabled

APIs

image.png

All APIs use AES 256 bit keys with a customisable key rotation policy

image.png

All data is transmitted through TLS by default

DECENTRALISED INFRASTRUCTURE

image.png

The system is designed in a decentralised manner. The benefit of this is that were a breach to occur with one component it does not provide access to other components of the system as a whole.

USER ACCOUNTS

image.png

Robust password policies are in place for all account access and at all levels

image.png

Access Control Levels can be set so that the majority of an organisations users only have access to the detection API

image.png

Usernames can be changed from email to a separate username with specific requirements as needed

image.png

Payments have PCI DSS compliance provided by Stripe

CUSTOMER DATA

image.png

Our models are trained on datasets which are completely independent of customer data. Individual customers will never see other customers data

image.png

GDPR / CCPA compliance

image.png

History is by default turned off for customer accounts so no pattern of information collected by user or customer can be determined unless this is required by the customer

image.png

Our custom integrations use a separate database with separate access control for each customers data. Configured at time of onboarding

DISASTER RECOVERY

image.png

There is a comprehensive DR plan in place to restore the system within two hours of a total failure

image.png

Code is backed up offsite daily

image.png

Databases are backed up offsite daily

image.png

Optional redundant storage to keep copies of your customer data across multiple secure data centres

THREAT MANAGEMENT

!

System intrusion detection is provided in realtime

!

System administrators alerted upon a breach

bottom of page