Security, Trust, and Compliance at Bonfy

Bonfy.AI protects your most sensitive data so you can move fast with AI—without sacrificing security or compliance. Our platform is built for modern security, privacy, and governance teams who need enterprise‑grade controls for GenAI, copilots, and AI agents.

 

Click here for our Privacy Policy.

Independent Security Validation

We invest heavily in third‑party audits and certifications so you don’t have to take our word for it.

SOC 2 Type II
Bonfy.AI is SOC 2 Type II certified, demonstrating that our security, availability, and confidentiality controls have been independently audited over an extended period for design and operating effectiveness.

 

GDPR

Bonfy.AI supports customers’ GDPR obligations with strict data minimization, purpose limitation, access controls, and data subject request processes, and we act as a data processor under our Data Processing Agreement (DPA).

Additional frameworks and standards

  • Enterprise‑grade encryption in transit and at rest

  • Secure development lifecycle (SDLC) with code review and automated security testing

  • Vendor and third‑party risk management program

  • Incident response and business continuity playbooks

 

If you need detailed documentation (e.g., our SOC 2 report, DPA, or security questionnaire), your Bonfy.AI account team can provide it under NDA.

Data Security by Design

Bonfy.AI is an AI‑native data security platform designed to protect unstructured data everywhere it moves—email, SaaS apps, collaboration tools, copilots, and AI agents.

Key security controls include:
  • Access control and identity
    • SSO and SAML‑based authentication
    • Role‑based access control with least‑privilege defaults
    • Fine‑grained permissions for admins, security teams, and workspace owners
  • Encryption and key management
    • TLS for all data in transit
    • Strong encryption for data at rest
    • Strict key management and rotation policies
  • Monitoring, logging, and detection
    • Centralized logging of administrative and sensitive actions
    • Continuous monitoring for anomalous behaviors and access patterns
    • Alerting workflows that integrate with your existing security stack
  • Secure product development
    • Security reviews as part of every release
    • Regular penetration tests and vulnerability assessments
    • Formal change management and deployment approvals

Contact Information

We encourage prospects, customers, and partners to reach out with security and privacy questions. For security‑related inquiries, disclosures, or documentation requests: