PRODUCT

FEATURES

USE CASES

INDUSTRIES

CASE STUDIES

PARTNERS

SEARCH OUR SITE
REQUEST A DEMO
BlogTeamPricingDocsLogin

Security

End-to-end enterprise-class security with role-based access controls, encrypted transport protocols, and token and key management.
Security
At Formant we treat security as a first-class feature and evaluate all engineering decisions and implementations with the security of our stack and our customers' data in mind. Security is a feature of our product that is constantly being improved due to the fast-paced nature of the field and the feedback we have from our customers.

The security of our platform covers data transport and storage, user/robot authentication and authorization, network protocols, and API design. This first post will cover how we secure end-to-end encryption and identity throughout our stack.

User And Device Identity

All API interactions and data points are associated with an individual user or device.

Cgroup Compatible

Run the Formant agent in a Linux cgroup for additional sandboxing.

Encryption In-transit And At-rest

Encrypted transport protocols and storage everywhere in the stack.

Secret Management

Asymmetric credentials, time-limited tokens, and key rotation.

Secure Interaction Model

Structured, administrator-defined actions, not arbitrary code execution.
Security Architecture
Formant's end-to-end security architecture
Whitepaper on Formant security

See it in action

Contact us to discuss your project and get a tailored demo of our platform.
© 2021 Formant • 1999 Bryant St · San Francisco, CA 94110
Using onsite robots to conduct routine investigations allowed BP to centralize the expertise to review and analyze the findings—improving efficiency and reducing operational costs.