Is DeliciousAI safe?
Review DeliciousAI security risks.

The following security profile for DeliciousAI includes the basics you’ll need for a vendor risk assessment: security certifications, supply chain details, privacy policy, terms of service, GDPR compliance, and more.
DeliciousAI Organization Details

Category

AI Tools

Organization Details

What is DeliciousAI?

See how AI envisions you. Transform your selfies or pet photos into works of art, from realistic to fantastical, with just a few taps in the Delicious app!

Headquarters

Hosting

Hosting locations

Security Program

Security Certifications

SOC2 Compliance
PCI Compliant
HIPAA Compliant
SOC2 Compliance
SOC 2 Compliant
GDPR Compliant
ISO 27001 Compliant
FedRamp Compliant
CSA Star Level 1
Compliant

Security Page

Security Portal

Bug Bounty

Vulnerability Disclosure

Status Page

Authentication

Authentication / SSO

Supported Okta Features
  • SWA
Login with Google support
Login with Microsoft support
Supports SSO
Two-factor authentication via SMS
Two-factor authentication via E-mail
Two-factor authentication via Hardware
Two-factor authentication via Software
Two-factor authentication via TOTP
Two-factor authentication via U2F

OAuth Details

DeliciousAI Supply Chain
  • Amazon Web Services (AWS)
  • Webflow
  • Google Tag Manager
DeliciousAI Subdomains

Regain control of SaaS security.

Nudge Security discovers all SaaS accounts ever created by anyone in your org within minutes of starting a free trial. Get a full SaaS inventory today, along with insights and automation to improve your SaaS security posture.

was able to find all this and much more.
Nudge was able to find all this and much more.
Nudge Security provides detailed security profiles for thousands of SaaS apps. Sail through security assessments with our proprietary intelligence on vendors’ security, risk, and compliance programs.
Stop chasing down answers. Start a free 14-day trial of Nudge Security to learn:
Stop chasing down answers.
Start a free 14-day trial of Nudge Security today.
Who’s using DeliciousAI in your org?
What data does DeliciousAI have access to?
What is DeliciousAI’s breach history?
What apps are in DeliciousAI’s supply chain?