Clear definitions for AI, automation, and compliance terminology
The use of artificial intelligence to perform tasks that previously required human intervention. In business contexts, this typically involves automating repetitive workflows, document processing, and decision-making processes.
Learn more about AI consulting servicesA contract required under HIPAA between a covered entity and a business associate. The agreement ensures that the business associate will appropriately safeguard protected health information.
Learn more about HIPAA complianceCybersecurity Maturity Model Certification. A framework developed by the Department of Defense requiring defense contractors to meet specific cybersecurity standards to protect controlled unclassified information.
Learn more about CMMC compliance servicesInformation that requires safeguarding or dissemination controls pursuant to federal law, regulation, or policy, but is not classified under Executive Order 13526.
Learn more about CUI protectionA set of practices combining software development and IT operations. DevOps aims to shorten the development lifecycle and provide continuous delivery with high software quality.
Learn more about DevOps servicesFederal Risk and Authorization Management Program. A government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.
Learn more about FedRAMP complianceHealth Insurance Portability and Accountability Act. U.S. legislation that provides data privacy and security provisions for safeguarding medical information.
Learn more about HIPAA compliance servicesManaging and provisioning computing infrastructure through machine-readable configuration files rather than physical hardware configuration or interactive configuration tools.
Learn more about DevOps automationAn international standard for managing information security. It specifies requirements for establishing, implementing, maintaining, and continually improving an information security management system.
Learn more about ISO 27001 certificationA type of artificial intelligence that uses deep learning and large datasets to understand, summarize, generate, and predict content. Examples include GPT, Claude, and Llama.
Learn more about Private LLM deploymentA subset of artificial intelligence that enables systems to learn and improve from experience without being explicitly programmed. ML algorithms build models based on training data to make predictions.
Learn more about AI consultingA NIST publication that provides recommended security requirements for protecting controlled unclassified information in non-federal systems and organizations.
Learn more about NIST compliancePayment Card Industry Data Security Standard. A set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment.
Learn more about PCI DSS complianceProtected Health Information. Any information about health status, provision of healthcare, or payment for healthcare that can be linked to a specific individual and is protected under HIPAA.
Learn more about HIPAA complianceA large language model deployed within a controlled environment where data never leaves the organization's infrastructure. Used by healthcare, financial, and government organizations to leverage AI while maintaining data privacy.
Learn more about Private LLM solutionsRetrieval-Augmented Generation. A technique that combines retrieval of relevant documents with text generation, allowing AI systems to provide accurate responses based on specific data sources.
Learn more about AI implementationRobotic Process Automation. Software technology that makes it easy to build, deploy, and manage software robots that emulate human actions interacting with digital systems and software.
Learn more about Workflow automationService Organization Control 2. An auditing procedure that ensures service providers securely manage data to protect the interests of the organization and the privacy of its clients.
Learn more about SOC 2 complianceA SOC 2 report that evaluates the design of security controls at a specific point in time. It verifies that controls are properly designed but does not test their operating effectiveness over time.
Learn more about SOC 2 certificationA SOC 2 report that evaluates both the design and operating effectiveness of security controls over a period of time, typically 6-12 months. More rigorous than Type I and preferred by enterprise customers.
Learn more about SOC 2 Type IIA security concept centered on the belief that organizations should not automatically trust anything inside or outside their perimeters. Instead, they must verify anything trying to connect to systems.
Learn more about Security services