Frame 1618871956

Murphi.ai Security

Enterprise-Grade Security for Healthcare AI

Sub Heading
Enterprise-Grade Security for Healthcare AI

Murphi.ai protects patients data with enterprise-grade encryption, rigorous compliance standards and continuous monitoring. We treat your data security as our primary feature.

Perfect Flip Card
SOC Badge
Murphi.ai maintain SOC2 Type II Compliance, demonstrating that our security, availability and confidentiality controls are not only properly designed but consistently operating effectively over time.
Perfect Flip Card
SOC Badge
Implement administrative, physical, and technical safeguards to ensure the confidentiality , integrity and availability of Protective Health Information (PHI)
Perfect Flip Card
SOC Badge
Confirming that we operate a formally governed, risk-driven Information Security Management System (ISMS) that protects information assets across the enterprise.

Headline
How We Protect Your Data

Sub Heading
How We Protect Your Data

Security and compliance are built into our platform. We meet the highest global standards to keep your data private, protected, and always available.

Sub Heading
Zero Trust Architecture

We never assume trust. Every access request is verified, authorized, and encrypted.

Frame 1618871961 2

Verify Explicitly

Every request is authenticated, authorized, and encrypted, regardless of network location.

Frame 1618871961 5

Least-Privilege Access

We enforce minimum necessary permissions (JIT/JEA) to strictly limit data exposure.

Frame 1618871961 6

Continuous Validation

Trust is constantly re-evaluated based on real-time identity and device health signals.

Sub Heading
Defence-in- Depth

Security strategy incorporates layers of protection to prevent unauthorized access, mitigate risks.

Frame 1618871961 7

Network Security

Firewalls, intrusion detection, and prevention systems continuously monitor and defend against threats.

Frame 1618871961 8

Data & Application

Enforce secure coding, RASP, encryption, and strict access controls to protect applications and data.

Frame 1618871961 9

AI-Powered Security

Adversarial defenses and sanitization block prompt injections, ensuring no sensitive information is memorized.

Sub Heading
Regular Monitoring

Around-the-clock security surveillance powered by advanced AI and expert analysts.

Frame 1618871961 18

AI Threat Detection

Automated threat detection using advanced analytics identifying anomalies before incidents

Frame 1618871961 17

24/7 Security Ops

Our dedicated SOC team responds to incidents in real-time, ensuring rapid  resolution.

Frame 1618871961 19

SIEM Integration

Security Information for comprehensive log analysis and anomaly detection and alerting.

Headline
Technical Safeguard

Sub Heading
Technical Safeguard

Industry-leading technical controls that protect your data at every layer, ensuring comprehensive security and continuous operational resilience.

ChatGPT Image Jan 16 2026 05 13 50 PM

Secure Cloud Hosting

Frame 1618871972

Enterprise Providers

Hosted on secure, compliant AWS, GCP, and Azure.

Frame 1618871972

Geo-Redundancy

Regional failover mechanisms ensure continuous service availability

Frame 1618871972

DDoS Protection

Advanced defenses block large-scale attacks to maintain access.

ChatGPT Image Jan 16 2026 05 13 50 PM
qtq80 yymVz8

Identity & Access Management

Frame 1618871972

RBAC

Granular permissions limit users to role-relevant data only.

Frame 1618871972

Least Privilege

Access is strictly limited to reduce attack surfaces.

Frame 1618871972

Strong Authentication

Identity verification protocols prevent all unauthorized entry.

ChatGPT Image Jan 16 2026 05 15 23 PM

Vulnerability Management

Frame 1618871972

OWASP Practices

SAST and DAST testing follow industry-best security standards.

Frame 1618871972

Security Testing

Frequent assessments and annual third-party penetration tests.

Frame 1618871972

Bug Bounty

Ethical hackers identify and report potential system vulnerabilities.

ChatGPT Image Jan 16 2026 05 15 23 PM
ChatGPT Image Jan 16 2026 07 06 03 PM

Disaster Recovery

Frame 1618871972

Rapid Recovery & Continuity

Recovery and continuity plans minimize downtime and disruption.

Frame 1618871972

Testing & Monitoring

Recovery plans are regularly tested and reviewed to ensure readiness and effectiveness.

Frame 1618871972

Data Backups & Redundancy

Critical data is automatically backed up and stored redundantly to ensure availability.

ChatGPT Image Jan 16 2026 07 16 09 PM

Data Encryption & Protection

Frame 1618871972

In Transit

Data uses TLS 1.2+ for secure user communication.

Frame 1618871972

At Rest

Stored data is secured with AES-256 industry-standard encryption.

Frame 1618871972

Key Management

HSMs protect encryption keys from any unauthorized access.

ChatGPT Image Jan 16 2026 05 09 26 PM e1768572530926

Headline
AI Governance

Sub Heading
AI Governance

Responsible AI development with comprehensive oversight and strict data protection.

Frame 1618871972

Responsible AI Practices

AI systems are developed in accordance with ethical principles, emphasizing fairness, transparency, and accountability.

Frame 1618871972

No Training on Customer Data

Customer data is never used to train foundational AI models and remains isolated from development.

Frame 1618871972

Human Oversight & Risk Management

AI outputs are monitored by qualified personnel, with regular assessments to identify risks, bias, and compliance gaps.

Headline
Security Documentation Portal

Sub Heading
Security Documentation Portal

Access compliance reports, security attestations, and governance documents through a secure, NDA-protected portal.

Frame 1618871961 12

Soc2 Type II Report

Frame 1618872083
Frame 1618871961 13

Penetration Testing Reports

Frame 1618872083
Frame 1618871961 14

HIPAA Compliance Attestation

Frame 1618872083
Frame 1618871961 15

Business Associate Agreement (BAA)

Frame 1618872083

Headline
Third-Party Sub-Processors

Sub Heading
Third-Party Sub-Processors

We partner with carefully selected third-party sub-processors to enhance product functionality while maintaining strict security and compliance standards.

Vendor Purpose Location
Amazon Web Services
Cloud Infrastructure
USA
Microsoft Azure
Cloud Infrastructure
USA
Google Cloud Platform
Cloud Infrastructure
USA
Everyware
Payment Processing
USA
Fortis
Payment Processing
USA
Twilio
Communication & Messaging
USA
360 Dialog
Communication & Messaging
USA
Firebase
Crash Logs
USA

All sub-processors are contractually obligated to adhere to our security policies and regulatory requirements.

Headline
Responsible Disclosure

Sub Heading
Responsible Disclosure

Murphi.ai values security researchers and ethical hackers who help improve our security posture.

Frame 1618871961 11

Continuous Validation

If you believe you have discovered a security vulnerability, we strongly encourage responsible disclosure through our coordinated security reporting process:

  • Contact our Security Team at info@murphi.ai
  • Provide steps to reproduce the vulnerability
  • We will investigate and work on a resolution
Frame 1618871961 10

Transparency Commited

If you believe you have discovered a security vulnerability, we strongly encourage responsible disclosure through our coordinated security reporting process:

  • Contact our Security Team at info@murphi.ai
  • Provide steps to reproduce the vulnerability
  • We will investigate and work on a resolution