More secure than any cloud

SwarmOne is far more secure than any cloud because of the way we process AI workloads.
Both our process and technology have been certified to meet SOC 2 Type 2 Standards for security, availability, processing integrity, confidentiality, and privacy of the customer information.
SwarmOne is more secure by design
Our Commitment to Security
At SwarmOne, we prioritize the security of our systems and the protection of your data. We understand the importance of trust in our technology and services. Our dedicated security team is committed to providing a secure and reliable environment for all our users and customers.
Secure by design
SwarmOne allows you to work from your own environment, you work on your training code, and all the engineering is abstracted away, we seamlessly handle
the technical complexities – and the security. There’s no need for you to worry about mounting buckets, granting
permissions, or opening ports.
Application Security
  • Encrypted communication between client IDE, platform,
and compute;
  • Information stored in our databases is encrypted at rest;
  • Software dependencies are audited by Github’s Dependabot;
  • HTTPS is forced for all services using TLS (SSL);
  • Automated testing of application security using synthetic data.
Infrastructure Security
  • Hardened attack surfaces for all network devices;
  • Continuous network monitoring;
  • Protection from unauthorized access and attacks;
  • Highly restrictive access control for network and data access;
  • Log analysis via Datadog and Sentry.
Corporate Security
  • All employees have secure access to the company infrastructure;
  • Access is gated on a SSO Identity Provider (IdP);
  • Mandate phishing-resistant multi-factor authentication (MFA);
  • We regularly audit access to internal systems.
Continuous Improvement 
& Vulnerability Remediation
  • Regular testing by external penetration testing firms;
  • Continuous systems  monitoring and vulnerabilities analysis;
  • Rapid identification and deployment of security patches;
  • Ongoing security research and security trend analysis;
  • Annual business continuity and security incident exercises.