For assessment platforms
Your enterprise buyers ask for network-layer security by name. Embed it under yours.
One REST API. Zero candidate friction. Zero UI changes. Aiseptor becomes the security substrate of your platform — your brand stays on the glass, Aiseptor handles the device and network layer beneath.
// Create an Aiseptor-secured session for a candidate.
// Your platform keeps exam authoring, scoring, and UX;
// Aiseptor handles the device + network layer.
POST /api/v1/sessions
Authorization: Bearer $AISEPTOR_API_KEY
{
"candidate_id": "cand_7f3a...",
"exam_ref": "exam_a1b...",
"duration_minutes": 90,
"policy": {
"allowed_domains": ["leetcode.com", "docs.python.org"],
"aegis_mode": "active"
}
}
// → 201 Created
{
"session_id": "sess_xyz...",
"join_code": "482917",
"agent_download_url": "https://cdn.aiseptor.com/..."
}Full API spec on the partnership call. Webhook signatures use HMAC-SHA256.
Why platforms embed
Your enterprise buyers are losing trust in your scores. Aiseptor gives it back.
You already know the data. Half of technical candidates are using AI in live interviews. Your enterprise buyers know it too — and they are renegotiating their contracts, piloting alternative vendors, or building in-house. The churn isn't coming from a better assessment engine; it's coming from a cheating tool that your stack can't see.
Detection loses every generation. Aiseptor shifts the contract from detecting misbehavior to preventing the network path that makes it possible — mathematically, on any candidate device, without touching your UX.
The integration
Three endpoints. One webhook. Ship in a week.
You don't rebuild your platform. You embed a security substrate. Your candidate still lands on your UI, takes your assessment, and submits to your scoring engine — with an Aiseptor-secured device underneath.
Create a secured session
When a candidate begins an assessment, your backend calls POST /api/v1/sessions with an exam reference, duration, and allowed-domain policy. Aiseptor returns a short-lived session_id and 6-digit join code.
Candidate joins the enclave
Your UI shows the join code and agent download link. The candidate runs the Aiseptor agent, enters the code, and is inside a 30-second-deploy ephemeral security enclave. No persistent install. No kernel drivers.
Receive the verdict webhook
On session end, Aiseptor posts a signed webhook with the Aegis integrity score, flagged signals, and a link to the full audit report. Your platform ingests it and stores it against your candidate record.
POST https://your-platform.com/aiseptor/webhook
X-Aiseptor-Signature: sha256=...
{
"event": "session.ended",
"session_id": "sess_xyz...",
"aegis": {
"status": "FLAGGED",
"signals": ["AI_LOCAL_LLM", "OVERLAY_CHEAT"]
},
"audit_url": "https://gateway.aiseptor.com/report/..."
}The commercial story
Transparent public pricing. The same rates for everyone.
Aiseptor publishes one price list. Your enterprise buyers see exactly what you see — no secret wholesale rate, no channel-markup game to defend. A partnership isn't about reselling our product; it's about tighter integration and the commercial defense that comes with it — named on your security page, co-marketed on buyer RFPs, and a unified integrity narrative when cheating complaints hit procurement.
| Candidates per session | Price per session |
|---|---|
| Up to 5 | $3 |
| Up to 10 | $4 |
| Up to 15 | $5 |
| Up to 20 | $6 |
| 20+ candidates or 5,000+ sessions/month | Custom |
Partnership-tier features — enterprise SLA, white-label audit PDFs, extended data retention, SOC 2 shared responsibility mapping, dedicated integration engineer — are bundled at the custom commercial tier and negotiated during partnership kickoff.
Who owns what
You keep your brand. We handle the hard part.
- Exam authoring and question banks
- Candidate scheduling, invitations, and branding
- Scoring engine and result reporting
- The enterprise buyer relationship
- All UI — candidates never leave your platform
- Storage of results, submissions, and audit records
- The ephemeral security enclave on the candidate device
- Real-time device + network threat prevention
- Aegis integrity scoring + structured signal output
- Candidate agent binaries for Windows and macOS
- Cryptographic audit trail (webhook-delivered)
- Threat intelligence updates against new cheating tools
Trust & compliance
Your security review team will sleep easy.
Compliance
SOC 2 Type II (Q3 2026)
SOC 2 audit in progress with a targeted report date of Q3 2026. GDPR- and CCPA-compliant by design; standard DPA available for enterprise contracts.
Data handling
Session metadata only
Aiseptor collects DNS queries and process names. No webcam. No microphone. No keystrokes. No file contents. 24-hour retention by default; longer windows available under DPA.
Security posture
Public bug bounty
The assessment industry's first public bounty program. Aiseptor invites the research community to break the enclave; findings land in a signed CVE log.
Intellectual property
Patent pending
Method of deploying an ephemeral deterministic network enclave in user-space without kernel privileges or persistent drivers. Covers interception of 25+ attack vectors.
60-minute deep dive. Your engineer asks anything. We show the API, the audit trail, and the math.
Book a partnership call and we'll tailor the session to your platform — walking through integration timelines, pricing for your expected session volume, and your security review checklist. Technical founder in the room. NDA standard.