VirtalAgent Mail

Security & compliance posture

Engineering leadership hosted in Austin; review alongside privacy and entity facts.

Identity & access

Least privilege

Role-based controls, mandatory MFA for operators, quarterly access audits.

Encryption

In transit / at rest

TLS for public endpoints, encrypted volumes for stored transcripts—details available under NDA.

Logging

Detect anomalies

Centralized logs with retention aligned to customer agreements and Texas business records guidance.

Vendors

Subprocessor diligence

Review calendar for LLM hosts, hosting regions, and failover partners—documented during procurement.

Incident response

Customer comms

Defined severities, Austin-based coordinator, customer notification windows per contract.

Customer responsibilities

Shared model

You classify data, we provide tooling. See terms + disclaimer.

Abstract network visualization referencing secure Austin data routing

Home · Integrations