Trust portal
Security documents your team can review before launch.
Find Adelante security documents, legal resources, subprocessors, and data protection details before connecting Zendesk or an AI support agent.
Security evidence available for review.
Standard agreements for privacy and healthcare needs.
Messages are processed, then erased after completion.
Review areas
What your security team can check first.
Start with the controls most reviewers ask about: compliance support, encryption, infrastructure, subprocessors, and retention.
HIPAA support
Review our BAA and confirm how Adelante handles customer conversations that may involve protected health information.
GDPR support
Review our DPA, subprocessors, and privacy terms before connecting customer data.
Encryption
Data sent between Zendesk, your connected tools, and Adelante is protected with TLS 1.2 or higher.
Document requests
Your team can request documents, ask follow-up questions, and review the controls needed before launch.
AWS infrastructure
Adelante runs on AWS infrastructure designed for production reliability and security.
Zero data retention
Customer messages and connected tool data are processed, then erased after the request is complete.
Encrypted communication between connected systems.
Production infrastructure hosted on AWS.
Data processing terms available before launch.
Security measures
Security controls your team can review.
Review how Adelante protects data, limits access, monitors infrastructure, and manages vendors before granting access to Zendesk, customer data, or connected commerce systems.
Data processing and privacy
- TLS 1.2+ protects data in transit.
- API keys and credentials are stored with secure secret management.
- Personal data is not retained after processing is complete.
- Operational logs are kept limited and avoid personal data.
Infrastructure security
- Production systems run on AWS-hosted infrastructure.
- Security-relevant events are monitored, including access changes, errors, and traffic spikes.
Access control
- Access is limited to authorized personnel.
- Role-based access follows least-privilege principles.
- MFA is enforced on production systems.
- Access reviews are performed to keep permissions current.
Vendor management
- A subprocessor list is available for review.
- DPAs are maintained with relevant vendors.
- Vendor security is reviewed on a recurring basis.
Company security
- Company devices are encrypted and protected.
- Security policies are reviewed on a recurring basis.
- Team members receive security training.
- External security testing is part of the security program.
Documents
Open the files your review needs.
Use these resources for legal, security, and privacy review. If a document is not public, request it from us.
Standard DPA
Review data processing terms before connecting customer data.
Open DPAStandard BAA
Review healthcare data protection terms when HIPAA support is required.
Open BAASubprocessors
See the services that may support Adelante delivery.
View listISO 27001
Review current ISO 27001 certification documentation.
View certificateNDA
Use the mutual NDA when your review requires confidentiality first.
Open NDASOC 2 Type II
Request the SOC 2 report as part of your security review.
Request reportCompliance
Certifications and agreements for regulated teams.
Adelante supports teams that need stronger documentation before they connect customer support data, including DPA, BAA, ISO, SOC 2, and subprocessor review paths.
Security review
Need help getting approval?
Send the security, privacy, or legal questions your team needs answered. We will help you review the documents and clarify the next step before launch.