Gain enterprise visibility and competitive advantage now.

Leading edge security

Robust data security, privacy and confidentiality designed to deliver revenue-generating business intelligence for highly regulated enterprises.

FeedStock’s systems have been built using state-of-the-art security practices and follow both security and privacy by design principles. Developed using the latest advancements in AI data-capture technology, multi-lingual deep learning NLP and founded on best-in-class data security and privacy methodologies.

FeedStock unlocks measurable value with a unique end-to-end platform that captures, identifies and extracts enterprise-wide unstructured data generated by communication channels and turns it into high-value actionable insights.

Security experts in highly regulated environments

FeedStock’s team of data privacy and security experts design, build and integrate best-in-class IT systems to satisfy the compliance, legal and security requirements of the most highly regulated institutions.

Best in class standards

In recognition of our commitment to information security, FeedStock is ISO27001 certified, the international best practice standard for information security.

In order to maintain our certification, FeedStock is audited annually by SOCOTEC Group, a UCAS accredited certification body. In addition to this, CIS ControlsTM are used throughout the system.

On-premise privacy or cloud security – you choose

The majority of FeedStock’s clients opt for the fully SaaS solution, implemented on cloud infrastructure provided by AWS under a dedicated, isolated and secured AWS account.

FeedStock also deploys on-premise components that integrate with the clients’ infrastructure. These on-premise components limit the types of data that leave the organisation meeting more traditional enterprise deployment requirements. The client has complete control of these components which includes our state-of-art AI models. This hybrid deployment mode ensures confidential information such as email body, chat or voice content do not leave the organitsation.

More information on our flexible, modular deployment options is available on out Technology page.

Identify Opportunities. Boost ROI

FeedStock and AWS

The infrastructure that AWS provides to its clients is designed and managed in alignment with security best practices and a variety of IT security standards, including but not limited to:

  • SOC 1 / SOC 2 / SOC 3
  • FedRAMP
  • DOD CSM Level 1-5
  • ISO 27001

In addition to leveraging AWS best practice industry standards for cloud IT infrastructure, FeedStock employs all the available authentication credentials for access to our VPCs, including IAM passwords, Security Keys for CLI, SDK & API access, U2F multi-factor authentication devices and X.509 certificates to secure SOAP protocol requests.

Advanced encryption

All data is encrypted at rest using 256-bit Advanced Encryption Standard and all in-transit data is encrypted using Transport Layer Security (TLS).

The most sensitive data is further encrypted so that plain text never exists on FeedStock servers at any point. Clients are able to own the encryption keys to their data through the AWS Key Management Service (KMS) offering.


Granular access control

FeedStock classification activities and system infrastructure is protected and accessed through a Virtual Private Network (VPN) on AWS. Access is controlled and monitored by Access Control Lists (ACLs).

Granular ACLs are maintained in accordance with a ‘minimum necessary access policy’, whereby employees are only granted access to data that their role requires. The ACLs and user access rights are reviewed and amended on a regular basis to ensure they are current and based on business requirements.

100% data protection

FeedStock ensures that integrity of information is achieved by protecting access to the data streams and components. On-premise components are never exposed to external networks and are only accessible through VPN or bastion hosts for maintenance procedures.

On-cloud data pipelines are only accessible by authorised AWS IAM users. Activities of the IAM users on AWS are logged and stored permanently on AWS CloudTrail. Records received by the on-cloud data pipeline are uniquely identified and validated. All record processing operations in the data pipeline are idempotent.

Leading edge security experts.

For more detail, please contact us: