QueryPal

Decagon is the conversational AI platform that transforms customer interactions with AI agents. Seamlessly build, manage, and scale AI agents with Agent Operating Procedures (AOPs).
Compliance
CCPA
SOC 2 Type II
HIPAA
EU AI ACT
GDPR
Resources
Learn More
Compliance

Decagon SOC2 2025-06

Request Access
Other resources

Decagon Pen Test 2025-05

Request Access
Controls
View all
Infrastructure security
Unique production database
Encryption key access restricted
Unique account authentication enforced
+ 18 more
Organizational security
Asset disposal procedures utilized
Production inventory maintained
Portable media encrypted
+ 18 more
Product security
Data encryption utilized
Control self-assessments conducted
Penetration testing performed
+ 18 more
Internal security procedures
Continuity and Disaster Recovery plans
Continuity and disaster recovery plans
Cybersecurity insurance maintained
+ 18 more
Data and privacy
Data retention procedures established
Customer data deleted upon leaving
Data classification policy established
+ 18 more
Subprocessors
View all
Google Cloud Platform / Cloud hosting provider / USA, Belgium
Infrastructure Provider providing hosting services, storage and AI services
OpenAI / Large Language Model and AI services / USA, EU
Large language models and AI provider
Azure / Cloud provider / USA, EU
Infrastructure Provider providing hosting services, storage and AI services
Amazon Web Services / Cloud provider / USA, EU
Infrastructure Provider providing hosting services, storage and AI services
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Compliance
Decagon SOC2 2025-06

SOC2 Type II for Decagon, for the Period October 9, 2024 - April 9, 2025

Request Access
Other resources
Decagon Pen Test 2025-05

Decagon Pentest by the NCC Group

Request Access
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Infrastructure security
Control
status
Unique production database authentication enforced
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
Encryption key access restricted
The company restricts privileged access to encryption keys to authorized users with a business need.
Unique account authentication enforced
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
Production application access restricted
System access restricted to authorized access only
Organizational security
Control
status
Unique production database authentication enforced
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
Encryption key access restricted
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
Unique account authentication enforced
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
Production application access restricted
System access restricted to authorized access only
Organizational security
Control
status
Unique production database authentication enforced
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
Encryption key access restricted
The company restricts privileged access to encryption keys to authorized users with a business need.
Product security
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
Production application access restricted
System access restricted to authorized access only
Internal security procedures
Control
status
Unique production database authentication enforced
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
Encryption key access restricted
The company restricts privileged access to encryption keys to authorized users with a business need.
Product security
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
Production application access restricted
System access restricted to authorized access only
Data and privacy
Control
status
Unique production database authentication enforced
The company requires authentication to production datastores to use authorized secure authentication mechanisms, such as unique SSH key.
Encryption key access restricted
The company restricts privileged access to encryption keys to authorized users with a business need.
Product security
The company requires authentication to systems and applications to use unique username and password or authorized Secure Socket Shell (SSH) keys.
Production application access restricted
System access restricted to authorized access only
Subprocessors
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Subprocessors
Google Cloud Platform / Cloud hosting provider / USA, Belgium
Infrastructure Provider providing hosting services, storage and AI services
OpenAI / Large Language Model and AI services / USA, EU
Large language models and AI provider
Azure / Cloud provider / USA, EU
Infrastructure Provider providing hosting services, storage and AI services
Amazon Web Services / Cloud provider / USA, EU
Infrastructure Provider providing hosting services, storage and AI services
Google Cloud Platform / Cloud hosting provider / USA, Belgium
Infrastructure Provider providing hosting services, storage and AI services
OpenAI / Large Language Model and AI services / USA, EU
Large language models and AI provider
Azure / Cloud provider / USA, EU
Infrastructure Provider providing hosting services, storage and AI services
Amazon Web Services / Cloud provider / USA, EU
Infrastructure Provider providing hosting services, storage and AI services

Activate your free
6 week trial
& white-glove integration support.

Cut support costs by 60%, slash response & resolution times, improve your customer experiences, & reduce agent burnout. Find some time with us to show you how.

Unlock Your Free Trial