Aiden enforces mandatory source code peer reviews internally and third-party code scanning to protect our software integrity and packaging repository.
Monitoring & Testing
Our systems all go through periodic third-party penetration tests & are under continuous monitoring.
Industry Best Practices
Aiden follows industry best practices, including least privileged access, MFA/2FA, data encryption, multi-layered backups, and DLP monitoring and alerts.
Our Tech Stack
All tools in our tech stack utilize enterprise-grade security and are highly vetted and respected for their security controls.
Not An Agent
Aiden is not an agent and is not creating a persistent connection
to our clients’ endpoints. Our service and software are designed to ensure our clients are the only ones who can schedule and execute Aiden to run.