Trust portal

Security documents your team can review before launch.

Find Adelante security documents, legal resources, subprocessors, and data protection details before connecting Zendesk or an AI support agent.

Support work, ready to run
Customer context, approved actions, proof
Certifications
SOC 2 + ISO

Security evidence available for review.

Legal docs
DPA + BAA

Standard agreements for privacy and healthcare needs.

Data handling
Zero retention

Messages are processed, then erased after completion.

Review areas

What your security team can check first.

Start with the controls most reviewers ask about: compliance support, encryption, infrastructure, subprocessors, and retention.

HIPAA support

Review our BAA and confirm how Adelante handles customer conversations that may involve protected health information.

GDPR support

Review our DPA, subprocessors, and privacy terms before connecting customer data.

Encryption

Data sent between Zendesk, your connected tools, and Adelante is protected with TLS 1.2 or higher.

Document requests

Your team can request documents, ask follow-up questions, and review the controls needed before launch.

AWS infrastructure

Adelante runs on AWS infrastructure designed for production reliability and security.

Zero data retention

Customer messages and connected tool data are processed, then erased after the request is complete.

TLS 1.2+

Encrypted communication between connected systems.

AWS

Production infrastructure hosted on AWS.

DPA

Data processing terms available before launch.

Security measures

Security controls your team can review.

Review how Adelante protects data, limits access, monitors infrastructure, and manages vendors before granting access to Zendesk, customer data, or connected commerce systems.

Data processing and privacy

  • TLS 1.2+ protects data in transit.
  • API keys and credentials are stored with secure secret management.
  • Personal data is not retained after processing is complete.
  • Operational logs are kept limited and avoid personal data.

Infrastructure security

  • Production systems run on AWS-hosted infrastructure.
  • Security-relevant events are monitored, including access changes, errors, and traffic spikes.

Access control

  • Access is limited to authorized personnel.
  • Role-based access follows least-privilege principles.
  • MFA is enforced on production systems.
  • Access reviews are performed to keep permissions current.

Vendor management

  • A subprocessor list is available for review.
  • DPAs are maintained with relevant vendors.
  • Vendor security is reviewed on a recurring basis.

Company security

  • Company devices are encrypted and protected.
  • Security policies are reviewed on a recurring basis.
  • Team members receive security training.
  • External security testing is part of the security program.

Compliance

Certifications and agreements for regulated teams.

Adelante supports teams that need stronger documentation before they connect customer support data, including DPA, BAA, ISO, SOC 2, and subprocessor review paths.

Security review

Need help getting approval?

Send the security, privacy, or legal questions your team needs answered. We will help you review the documents and clarify the next step before launch.