CustomerGauge

Founded in 2007

|
|

Compliances

Compliance Logo

SOC 2

Compliant

Trusted by

Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo
Trusted By Company Logo

Controls

Continuously monitored

Product security

Vulnerability Remediation Process

Centralized Management of Flaw Remediation Processes

Data security

Identify Validation

Termination of Employment

Encrypting Data At Rest

Network security

Limit Network Connections

External System Connections

Transmission Confidentiality

App security

Conspicuous Link To Privacy Notice

Approval of Changes

Input Data Validation

Endpoint security

Malicious Code Protection (Anti-Malware)

Full Device or Container-based Encryption

Endpoint Security Validation

Corporate security

Organizational Structure

Roles & Responsibilities

Competency Screening

Resources

Access Control Procedure

Policy

Compliance Procedure

Policy

Code of Business Conduct Policy

Policy

Access Control Policy

Policy

Acceptable Usage Policy

Policy

HR Security Procedure

Policy

Testimonials

Michael B

| Head of Commercial Data Management at Coca-Cola Bottlers Japan Inc

""It's really an impressive first release [of Gaige AI]. Kudos to the product team who managed to assemble the powerful, but still notoriously fussy LLM components into a working, reliable, and intuitive product in such a short time. I can imagine the amount of work it took to get it to that level. You must be proud of result.""

FAQ