Amdahl
SOC 2 Type II Certified

Security at Amdahl

Our customers trust Amdahl with their marketing data and rely on us to be good custodians of their customers' data. We use best-in-class security practices to maintain a high level of security across our platform, infrastructure, and organization.

Learn More

Standards & Compliance

Amdahl maintains rigorous compliance standards to meet enterprise security requirements.

SOC 2 Type II

Our systems, processes, and controls are regularly audited as part of our SOC 2 compliance program. SOC 2 Type II reports are produced annually and can be provided upon request.

Privacy & Data Protection

We support GDPR compliance obligations through data deletion capabilities, sub-processor transparency, and clear data handling practices.

We do not train AI models on your data.

Machine learning is used solely for analytics and optimization within your account. Your data is never used to benefit other customers.

Zero Data Retention with Anthropic

We maintain a zero data retention (ZDR) agreement with Anthropic, ensuring that no customer data is stored or used for model training by the AI provider.

Platform Security

Security is a guiding principle for all our product design and infrastructure decisions.

Encryption

We mandate HTTPS for all services. All data stored in our infrastructure is encrypted at rest using AES-256. Encryption keys are managed through a dedicated key management service and are never stored alongside the data they protect.

Infrastructure Safeguards

Our security teams regularly scan for vulnerabilities and conduct penetration tests. We engage third-party security firms for independent assessments. Systems are regularly patched and server resources are refreshed on a regular cycle.

Data Isolation

Customer data is logically isolated within our infrastructure. Systems responsible for storing and processing customer data operate with dedicated credentials and strict access boundaries, separate from public-facing services.

Corporate Security

Security is every Amdahl employee's job.

Access Control

Employee access to customer data is restricted to those who need it to provide support or maintain the platform. Access to sensitive internal systems requires additional permissions beyond standard network access, and all access is logged and reviewed.

Security Posture

All code goes through peer review and automated testing before deployment. We monitor audit logs to detect abnormalities and watch for intrusions and suspicious activity across our infrastructure.

Security Training

Every employee completes annual security education. Our engineering team receives secure software development training, and we conduct internal security awareness exercises across the organization.

Access Management

We have a formal process for granting access to systems and information, and we regularly review and revoke inactive access. Actions within sensitive areas of our infrastructure require human review.

Data Practices

We access only the data necessary to deliver our services. All integrations are opt-in.

What data we access

Amdahl integrates with your existing tools and first-party data sources to generate insights and power content. Core data sources include:

CRM Data

Contact records, account details, pipeline and segmentation data from your CRM system.

Call Recordings & Transcripts

Sales and customer call data used to extract buyer intelligence and competitive insights.

Support Tickets

Customer support interactions that inform messaging, objection handling, and product positioning.

Depending on your configuration, Amdahl may also connect to Slack, email, Notion, and internal documentation. All integrations are opt-in and configured by your team.

How we use your data

Content Generation

We synthesize insights from your CRM, call transcripts, support tickets, and product docs to produce marketing content grounded in your actual buyer intelligence.

Analytics & Insights

We analyze your first-party data to surface patterns in buyer behavior, objection themes, competitive mentions, and messaging effectiveness.

Personalization

We use CRM and behavioral data to tailor content and messaging by audience segment, persona, and funnel stage.

Data Retention & Deletion

We retain your data only for as long as needed to provide our services.

30d

Production Data Deletion

All customer data is deleted from production systems within 30 days of account termination.

90d

Backup Purge

Backups containing customer data are purged within 90 days following our standard backup rotation schedule.

Anytime

Export & Deletion on Request

You can request data export or deletion at any time by contacting your account team.

You maintain full ownership of your data throughout our engagement. We act as a processor on your behalf and do not claim any rights to your content or customer information.