Aiden
Security Overview

Aiden is designed to accommodate the most security-focused infrastructures.
Here are some of the ways Aiden protects your content delivery supply chain.

AICPA SOC FOR SERVICE ORGANIZATIONS SERVICE ORGANIZATIONS LOGO

SOC 2 Type 2 Examination

Aiden has been independently audited against SOC 2 Security, Availability, and Confidentiality Trust Services Criteria (TSC) by Schneider Downs.  This examination affirms Aiden’s commitment to maintaining the highest levels of information security, availability, and confidentiality of our internal infrastructure, controls, and care for customer data.

SOC 2 is an industry-standard examination developed and maintained by the American Institute of Certified Public Accountants (AICPA).

Aiden’s customers can submit a request for SOC 2 report through our support or your assigned technical account manager.

Software Integrity

Aiden enforces mandatory source code peer reviews internally and third-party code scanning to protect our software integrity and packaging repository.

Monitoring & Testing

Our systems all go through periodic third-party penetration tests & are under continuous monitoring.

Industry Best Practices

Aiden follows industry best practices, including least privileged access, MFA/2FA, data encryption, multi-layered backups, and DLP monitoring and alerts.

Our Tech Stack

All tools in our tech stack utilize enterprise-grade security and are highly vetted and respected for their security controls.

Not An Agent

Aiden is not an agent and is not creating a persistent connection
to our clients’ endpoints. Our service and software are designed to ensure our clients are the only ones who can schedule and execute Aiden to run.

Industry Best Practices

We perform installations with the original, unmodified, digitally signed installation files from the software developer. Aiden installation files and software packages are always visible for inspection by our
clients’ engineers and security tools for all versions of Windows OS, drivers, firmware, and third-party applications we deploy.

Encryption & Package Repository Syncing

Aiden’s content is encrypted using TLS and is transferred directly from our cloud repository to the customer, without opportunity for any intermediary involvement. Every file in each client’s software and package repository is continuously monitored for unauthorized changes. Each software and package repository requires a one-time sync authentication approval via encrypted key, authorized by a human on each end, and neither the client nor Aiden hold the key once created.

Access Requirements

Aiden’s solution does not require any direct access to our clients’ networks. No VPN or other type of network access is required to use Aiden to deploy or update software.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Need to make an Aiden security incident report?

Securing every Windows endpoint and being able to rapidly deploy software to computers, so that we do not need to live in fear of the next attack, is not only a goal at Aiden – it’s our mission.

Schedule your 30-minute discovery call