Endlss Trust Centre
SOC 2 Type 2 Certified
The company behind Endlss (Penny AI) has achieved SOC 2 Type 2 certification for its sales productivity platform through rigorous independent third-party auditing. As we expand, we're actively pursuing SOC 2 Type 2 certification specifically for Endlss in 2025, demonstrating our ongoing commitment to enterprise-grade security and data protection across all our products.

GDPR
Endlss is committed to helping users understand their rights and obligations under the General Data Protection Regulation (GDPR).
CCPA
We operate in accordance with data protection policies that are based on privacy principles that underlie the California Privacy Act (CCPA).
Data Protection
Our secure platform implements military-grade encryption for sensitive data, both at rest and during transmission across distributed networks and devices. Critical information remains protected through robust AES-256 cryptographic algorithms, ensuring comprehensive, end-to-end data security.


Enterprise-Grade Infrastructure
Endlss uses Amazon Web Services (AWS) for the hosting and production environments. AWS data centers are monitored by 24×7 security, biometric scanning, video surveillance and maintain SOC 2, ISO 27001, and HITRUST compliance.

Data Redundancy and Resiliency
Our robust, fault-tolerant systems use multiple redundant components to prevent catastrophic failures. High-availability databases run in distributed clusters, while scalable, user-facing applications automatically adjust using lightweight, containerized deployments.

Comprehensive Security Controls
Our hardened infrastructure implements rigorous, industry-standard security protocols with detailed, auditable documentation. We maintain a centralized, automated system for tracking critical infrastructure changes and real-time logging of suspicious security events and potential threats.