Security Features
At Wilty, security is a core pillar of our platform.
Our solution is designed to help businesses navigate the risks posed by synthetic media, including both deepfakes and shallowfakes.
With enterprise-grade encryption, robust data protection measures, and flexible deployment options, Wilty AI ensures your sensitive information remains secure.
By combining cutting-edge technology with industry-leading safeguards, we provide the confidence needed to address emerging challenges in digital media integrity.
SECURE SOURCE CODE
Code is stored in secure version controlled platforms and can only be accessed by specific IP restricted user accounts which have MFA enabled
Databases are stored in industry standard databases by default and can only be accessed by specific IP restricted users with MFA enabled
APIs
All APIs use AES 256 bit keys with a customisable key rotation policy
All data is transmitted through TLS by default
DECENTRALISED INFRASTRUCTURE
The system is designed in a decentralised manner. The benefit of this is that were a breach to occur with one component it does not provide access to other components of the system as a whole.
USER ACCOUNTS
Robust password policies are in place for all account access and at all levels
Access Control Levels can be set so that the majority of an organisations users only have access to the detection API
Usernames can be changed from email to a separate username with specific requirements as needed
Payments have PCI DSS compliance provided by Stripe
CUSTOMER DATA
Our models are trained on datasets which are completely independent of customer data. Individual customers will never see other customers data
GDPR / CCPA compliance
History is by default turned off for customer accounts so no pattern of information collected by user or customer can be determined unless this is required by the customer
Our custom integrations use a separate database with separate access control for each customers data. Configured at time of onboarding
DISASTER RECOVERY
There is a comprehensive DR plan in place to restore the system within two hours of a total failure
Code is backed up offsite daily
Databases are backed up offsite daily
Optional redundant storage to keep copies of your customer data across multiple secure data centres
THREAT MANAGEMENT
!
System intrusion detection is provided in realtime
!
System administrators alerted upon a breach