Vendasta Opens Saskatchewan’s First Corporate Childcare Partnership with Tykes & Tots

Posted in Commentary with tags on July 31, 2025 by itnerd

Vendasta, the AI-powered platform for customer acquisition and engagement, has opened the doors to Saskatchewan’s first-ever corporate childcare partnership. The early learning centre, operated by Tykes & Tots and located inside Vendasta’s downtown Saskatoon HQ, is designed to meet the needs of working parents — and it’s already making a difference.

The centre accommodates up to 80 children across five bright, spacious classrooms. It serves children from six weeks to six years old, with flexible, child-guided programming built around play, curiosity, and exploration.

Why It Matters: Supporting Parents, Strengthening Community

The federal $10-a-day childcare program has increased demand for licensed spaces. Vendasta responded with a model that serves employees and the broader community.

  • 70% of spots are prioritized for Vendasta team members
  • 30% available to other tenants in the building
  • Any spots not filled by Vendasta or tenant families are available to other families in the community looking for care.
  • A $100,000 annual donation from Vendasta ensures programming decisions stay local, flexible, and focused on children
  • 5,000 sq ft of outdoor play space
  • Walking access to Meewasin Trail, Kinsmen Park, and downtown landmarks

This marks the sixth licensed childcare centre for Tykes & Tots, and their first inside a corporate HQ.

What Makes It Different

  • Child-led programming: Learning is guided by curiosity. If children become interested in bugs, educators build units around habitats, food, and ecosystems.
  • Play and exploration: Kids plant seeds, study butterflies, and even run garden boxes.
  • On-site chef and nutrition: Meals are crafted by a trained chef and dietitian. Culinary exploration is built into the curriculum.
  • Leadership development: Tykes & Tots team members pursue professional development beyond early childhood education, including:
    • Dale Carnegie training for frontline staff
    • Leadership Saskatoon participation, with a focus on conflict resolution, teamwork, and mentorship
  • Downtown community partnerships:
    • Under the “Little Tykes Kind Bites” initiative, police and fire teams will soon collaborate to distribute surplus food from the centre and Vendasta kitchen to people in need.
    • Children will participate by making cards of encouragement to include with the food containers.
    • Preschoolers will help dish out meals into containers, learning empathy through action as they prepare food for delivery.

Want to Help?

Tykes & Tots is actively building a base of local volunteers to support outdoor learning, field trips, and downtown discovery walks.

Interested in volunteering? Reach out to Cosette Kehoe at ckehoe@tykesntots.ca

Travel eSIM app Saily debuts Ultra, a new premium plan for unparalleled journeys

Posted in Commentary with tags on July 31, 2025 by itnerd

NordVPN’s travel eSIM app Saily is launching a premium subscription plan, Saily Ultra, which offers unlimited global eSIM data combined with special benefits for travelers.

The Saily Ultra plan combines top-tier essentials with exclusive perks:

  • Unlimited global data coverage. Saily Ultra enables users to browse however much they need, all while crossing borders. The plan provides unlimited eSIM connectivity in more than 110 destinations.
     
  • State-of-the-art cybersecurity tools. Alongside Saily’s built-in security features, Ultra users get access to Nord Security’s full product suite — monthly subscriptions to the advanced cybersecurity tool NordVPN, password manager NordPass, secure cloud storage NordLockerand personal data removal service Incogni.
  • 8% back in Saily credits. Ultra users get back 8% on purchases in the form of credits, while other Saily users receive up to 5%.
  • Ultra plan also grants priority access to Saily’s 24/7 support team.
  • Additional features are coming soon. Access to airport lounges, fast tracks, and more information about new benefits will be released soon.

The monthly plan offers auto-renewal, as well as complete freedom to cancel and reactivate it at any time.

The convenience of the Saily Ultra plan is ideal for frequent and business travelers, as well as digital nomads. Business travelers can rely on Ultra for seamless travel and quick communication, while digital nomads benefit from reliable data and strong cybersecurity for remote work. For frequent travelers, Ultra means less airport chaos with lounge access and fast-track lines.

An eSIM service — and much more

Saily has been focusing on expanding its offering. During the past year, the eSIM app has introduced numerous connectivity and convenience-related features — flexible unlimited data plans, auto top-ups, new plans for countries and regions.

The introduction of unique security features made Saily stand out from the other travel eSIM services even more. Virtual location, web protection, and ad blocker transformed Saily from an eSIM service provider to a comprehensive security app for travelers.

When using Saily’s security features, users can change their geolocation and block potentially malicious websites, trackers, and ads. Third-party audits showed that users save 28.6% of their mobile data on average with the ad blocker enabled.

Outpost24 Launches Free Credential Checker

Posted in Commentary with tags on July 31, 2025 by itnerd

Outpost24 today launched its Outpost24 Credential Checker, a free tool that provides organizations with a sneak peek into exposed credentials leaked on the dark web.

Timely visibility into credential exposure can mean the difference between a contained incident and a full-scale data breach for organizations of all sizes. The Outpost24 Credential Checker helps solve this serious issue by checking whether an organization’s email domain is linked to any credentials leaked on the dark web.

The Outpost24 Credential Checkeris powered with threat intelligence used by Outpost24’s CompassDRP, a Digital Risk Protection solution that gives security teams visibility over both the digital attack surface and external threats in a single cloud-based solution. It combines the asset discovery powers of Outpost24’s EASM platform with threat-intelligence powered DRP modules enabling organizations to monitor their known and unknown public-facing internal assets, as well as threats from external channels across the open, deep, and dark web. Once identified, these threats are easily prioritized due to contextual threat intelligence insights that speed up remediation efforts.

How it Works

Simply input an email address related to a corporate domain and the Outpost24 Credential Checker will search for matches in Outpost24’s database with billions of compromised credentials and in minutes a report will generate on whether the domain appears in known public breach repositories. The free report provides the number of stolen credentials found for a given domain and its web assets, as well as the most common reason for the data theft, including the most prevalent malware or virus that Outpost24 found stealing this data.

To start your first scan, access the Outpost24 Credential Checker here.

Metaforms raises $9M to give market research agencies their own AI workflows

Posted in Commentary with tags on July 31, 2025 by itnerd

The market research boom is creating an unexpected casualty: the agencies themselves. In an industry where clients expect faster turnarounds, competitive pricing, and diverse capabilities, agencies are turning down work – not for lack of interest, but because outdated operational systems keep them from meeting client expectations. Metaforms, a startup born from this bottleneck, is helping research teams scale without burning out. Today, the company announces a $9 million Series A to expand its AI infrastructure platform and accelerate adoption across the $130 billion global research industry.

The round was led by Peak XV Partners (formerly Sequoia India), with participation from Nexus Venture Partners and Together Fund. It brings Metaforms’ total funding to just over $10 million and will be used to grow the team, expand into new workflows like report generation and voice-based research, and deepen integrations with tools like Decipher, SPSS, and Confirmit.

When a global brand like a shoe company wants to make critical decisions about how to market it’s new pair of shoes in a geography it has never ventured into before. It engages a market research agency to figure out lifestyle habits and cultural perceptions of a population. For this the agency has to recruit a target population, design a research study, convert the survey questions into an online link, clean the data for fraud, do in-person interviews, combine all the data to finally make a presentation.

Metaforms builds AI agents designed to work within research agencies’ existing workflows, automating the manual processes that limit capacity and erode margins. Instead of replacing research expertise, the platform acts as a force multiplier: turning questionnaires into survey code, flagging bad data before it breaks a project, coordinating panel vendors, and tracking quotas across complex multi-country studies. 

For many agencies, this means the difference between turning away work and scaling up confidently.

Founded in 2022 by Akshat Tyagi and Arjun S, Metaforms was born out of a personal pain point. As early-stage founders, they struggled to access professional market research. The problem wasn’t demand – it was bandwidth. So Akshat and Arjun set out to build software that gave agencies a way to do more with what they already have.

Since launching commercially just six months ago, Metaforms has signed four of the world’s top twenty research agencies, including Strat7, one of the largest market research agencies globally. The platform now processes over 1,000 surveys per month, and serves Fortune 500 companies. Every customer that started with a single AI agent has expanded to adopt additional ones, achieving a 100% expansion rate.

That accessibility is already changing the industry. By compressing turnaround times and reducing operational costs, Metaforms enables agencies to serve clients they would otherwise turn away, from early-stage startups testing their first ideas to global brands launching multi-country trackers.

Looking ahead, Metaforms plans to triple its team and continue expanding the breadth of its agent capabilities. Voice research, automated report generation, and expanded language support are all on the roadmap. The long-term vision is to process over 100,000 surveys per year and make professional-grade research available to every business that needs it.

Guest Post: Threat Group Tycoon2fa Targeting C-Suite in New Wave of QR Attacks

Posted in Commentary with tags on July 31, 2025 by itnerd

By Daud Jawad, Security Engineer, Threat & Intelligence Management, Fortra 

A wave of phishing attacks is targeting executives and privileged users with well-crafted PDFs containing malformed QR codes – designed to bypass both traditional email defenses and exploit mobile vulnerabilities. These campaigns are believed to be tied to Tycoon2fa, a highly active and popular Phishing-as-a-Service (PhaaS) group. What sets this campaign apart is its high degree of targeting and customization, with attachments disguised as internal handbooks, complete with corporate branding, table of contents, and personalized names. This professional packaging, coupled with the sophistication of the QR phish allows low-skilled actors to launch advanced attacks on high-value individuals like C-level executives, managers, and directors.

Key Points and Modus Operandi
1. Targeted Delivery 

The email appears to originate from an internal system and includes a PDF attachment mimicking a new employee handbook.

 2. Personalized Context 

The PDF is tailored to the target, incorporating the official logo, corporate color scheme, recipient’s name, and company branding. It also includes a table of contents, step-by-step directions, and a QR code. 

3. The Malformed QR Code 

The embedded QR code is intentionally malformed, functioning when scanned by a phone but appearing as an image and evading detection by Microsoft’s security filters. This allows it to bypass tenant-level scanning and link extraction. 

4. Credential Harvesting 

Mobile Users are instructed to scan the QR code that, when scanned, directs to a spoofed Microsoft login page with the username pre-populated. Behind the scenes, the page acts as a reverse proxy: it forwards authentication requests to Microsoft to verify credentials. The traffic is then routed through a [.]ru domain where stolen credentials are harvested. If the correct password is entered, the user is redirected to the real Microsoft portal, unaware of the breach.

5. Phone Vulnerability 

The intent of the campaign is for the user to utilize a personal device or a poorly hardened corporate phone, for which the scanning from a personal device bypasses corporate web-filtering controls and secure web gateways. An added benefit to the phone usage is that the URLs are shortened on the phone browser by default, making them less noticeable and further reducing user suspicion.

Indicators and Attribution 
Threat Actor Group and Phishing-as-a-Service 

Phishing-as-a-Service (PhaaS) is a cybercrime model in which experienced hackers offer phishing tools, templates, and services to less-technical individuals for a fee, typically via subscription. This approach lowers the barrier to entry, enabling attackers with minimal technical expertise to deploy advanced phishing campaigns. Like legitimate software-as-a-service (SaaS) offerings, PhaaS providers supply:

  • Pre-built phishing kits 
  • Hosting and support 
  • Credential storage 
  • Malicious email and landing-page templates 
  • Step-by-step attack tutorials 
  • Credential-theft management tools

Our infrastructure analysis suggests this campaign leverages a PhaaS provider “Tycoon2fa” active since 2013. Subscription access for services range from $120 to $320 and include: 

  • Prebuilt phishing kits and templates 
  • Credential storage and management tools 
  • Step-by-step attack automation guides

Safe-Attachment Vulnerability 

During our investigation, a safe-attachment policy misfire was detected. A crafted string in the attachment triggered the policy, allowing the malicious PDF to pass through. Although this issue has been patched, we recommend auditing safe-attachment rules, scoping whitelists appropriately, and verifying that each policy remains necessary.

Dynamic Domain Generation 

Within the attacker’s infrastructure, we discovered a PHP-based subdirectory that generates custom domain and subdomain iterations. Users can specify prefixes, suffixes, and root domain segments, enabling the rapid creation of hundreds of unique URLs. This makes detections, tracking, and blocking far more challenging for security teams.

Mitigation 
Early threat detection is key to preventing data breaches, financial loss, and operational disruption: 

  • Proactive defense: Deploy real-time alerts for suspicious URLs, leveraging multiple threat-intelligence vendors and static IOCs on email gateways and web traffic monitoring systems. 
  • Pattern detection: Identify recurring artifacts such as random IDs in subjects, uniform attachment byte sequences, or sender-domain patterns by using regex or lexical rules on your secure email gateway. 
    • Fortra Secure Email Gateway (SEG) provides lexical expression capability which can be set to look for the IOCs found in text format or regex for a dynamic pattern-based detection.
  • QR code analysis: Use OCR-enabled email security solutions to extract and validate links embedded in QR codes before delivery. 
  • Blocking strategies: 
    1. Low level: Manually block known malicious domains/subdomains.
    2. Medium level: Temporarily block sending IPs until more robust pattern detection is in place.
  • Behavioral detection: Integrate heuristic analysis and dynamic vendor feeds to block evolving phishing patterns rather than relying on static indicators alone.

Summary 
QR code–based phishing is on the rise, delivered via email body, attachments, or seemingly benign URLs. Attackers exploit email-whitelisting gaps, malformed QR codes that evade tenant scanning, and mobile-only click prompts to bypass network defenses. A layered mitigation approach-including QR code extraction, multi-vendor URL scanning, advanced pattern detection, and stringent mobile-device management provides the best defense.

Flashpoint Releases Global Threat Intelligence Index: 2025 Midyear Edition 

Posted in Commentary with tags on July 31, 2025 by itnerd

Flashpoint just released its Global Threat Intelligence Index: 2025 Midyear Edition (Jan. 1-June 30, 2025). Flashpoint also has a companion blog here.

Serving as a companion to the Flashpoint 2025 Global Threat Intelligence Report (GTIR), this mid-year update delivers new intelligence on the fast-moving trends, tools, and tactics shaping the volatile threat landscape. In the four months since the GTIR’s publication, Flashpoint has observed the following rapid escalations in threat activity in 2025, with these percentages reflecting growth since the beginning of the year:

  • The theft of credentials via information-stealing malware has skyrocketed by 800%.
  • Vulnerability disclosures increased by 246%, with publicly-available exploits rising by 179%.
  • Ransomware incidents rose by 179%.
  • Data breaches have surged by 235%.

This report and the companion blog post are very much worth your time to read if you’re responsible for defending your environment from threats.

Ex-big tech cyber leaders launch Dawnguard from stealth with $3M to rewrite DNA of cybersecurity

Posted in Commentary with tags on July 31, 2025 by itnerd

 Dawnguard, a cybersecurity startup on a mission to make the digital world safer through intelligent, design-first security, has emerged from stealth with $3 million in pre-seed funding. The round was led by 9900 Capital and a group of angel investors, from scale-up founders to experienced CIOs and CISOs. The funds will be used to expand Dawnguard’s engineering team, deepen enterprise integrations, and bring its platform to broader production use.

Dawnguard is introducing a new cybersecurity category. Rather than bolting on security in production, Dawnguard embeds it at the core of system architecture — ensuring secure, compliant, and scalable designs from the earliest phases of development.

Dawnguard’s holistic approach sets it apart. Rather than just scanning deployments or automating reviews, it provides a shared canvas for engineering and security teams to collaborate on secure, compliant architecture that also balances cost, resilience, and sustainability.

Dawnguard was born out of a broken model – where security was reactive, slow, and dangerously disconnected from the pace of modern development. The founding team, led by CEO Mahdi Abdulrazak and CTO Kim van Lavieren, is composed of industry veterans from military and big tech companies like IBM, Microsoft and Amazon, with decades of experience running large-scale security programs and with unique experience at the intersection of security, AI, and cloud. 

Dawnguard is set to flip shift-left and security-by-design on its head. Instead of treating security as an afterthought, Dawnguard embeds it directly into a system’s architecture, from day zero to day 10,000. The company is building various AI/ML-driven engines that integrate across the entire IT landscape to spot issues in the design phase, adapt to evolving environments, and make security native.

The platform is designed for security architects, DevOps engineers, and cloud teams. At its core, Dawnguard is a security architecture automation platform purpose-built for cloud-native environments. It helps teams validate cloud infrastructure designs before deployment, automatically generate production-ready Infrastructure as Code (IaC) from validated designs, and continuously enforce security posture after deployment to eliminate drift.

“Hundreds of security tools overwhelm CISOs with promises of better detection, yet few tackle the root issue: design flaws in code that AI-driven threats exploit. As attacks grow smarter, defenses must shift left—embedding resilience at the codebase. We are excited to back Dawnguard, who build protection by design, not patch by necessity,” said Chris Corbishley, Managing Partner 9900 Capital.

Looking ahead, Dawnguard aims to reshape how the industry embeds security in the AI era. The company plans to expand its platform to support more dynamic environments, close the security gap between “vibe coding” and the infrastructure where GenAI coded applications run, and deliver a new operating model for building trust at scale.

Government Ransomware Roundup: Attacks on the Incline for H1 2025?

Posted in Commentary with tags on July 31, 2025 by itnerd

Comparitech researchers have released a study looking at all the government ransomware attacks of the first half of 2025. Government organizations are a dominant focus for hackers, due to the sensitive information the industry holds.

According to the findings, there was a 65% increase in attacks compared to the first half of 2024.

This research looks at ransomware attacks on government organizations by country, finding the U.S. to have been the most targeted. Additionally, the study outlines the biggest ransomware demands on governments, worldwide, as well as which gangs are most prolific in this industry. 

Key findings include: 

  • 208 attacks in total – 124 in Q1 and 84 in Q2
  • 104 confirmed attacks – 54 in Q1 and 50 in Q2
  • 104 unconfirmed attacks – 70 in Q1 and 34 in Q2
  • 366,006 records are known to have been breached in the confirmed attacks
  • 78.5 TB of data allegedly stolen (67.2 TB in the confirmed attacks)
  • Average theft of 1.3 TB of data per attack
  • Average ransom demand of $1.65 million
  • The most prolific ransomware strains with the highest number of claims against government entities were Babuk (26), Qilin (17), INC (16), Funksec (12), and RansomHub (12)
  • Qilin had the most confirmed attacks (13), followed by INC and RansomHub (8 each)

You can read the research here: https://www.comparitech.com/news/government-ransomware-roundup-h1-2025-stats-on-attacks-ransoms-and-data-breaches/

New BEC in the Financial Services Sector Threat Report Finds Nearly 4000 Malicious Domains in Q2 2025 

Posted in Commentary with tags on July 31, 2025 by itnerd

BforeAI has released its new threat report analyzing BEC in the financial services sector, finding 3756 suspicious and newly registered domains in April, May, and June of this year.

In Q2 2025, BforeAI observed 

  • Top 3 registrars: GoDaddy.com, LLC, Dynadot Inc., Tucows Domains Inc.
  • Top 3 registering countries: United States, China, United Kingdom
  • Top 5 TLDs (Top Level Domains): .com (1992), .info (260), .xyz (203), .online (105), .icu (104)
  • Finance-based TLDs: .finance, .financial, .money, .loan, .cash, .fund, .credit, .cards, .accountant, .bank, .investments, .capital, .exchange, .market, .insurance

Domain registration trends throughout the quarter showed a notable spike in activity, especially targeting financial brands. 

April saw a high volume of registrations, followed by a slight dip in May, and then a sharp rise in June, especially towards the end of the month. 

June also recorded the highest number of domain registrations overall. Between June 22 and June 30, 2025, there were at least 22 domains registered daily, peaking at 81 registrations on June 27 alone.

Beyond this, a consistent count of 10 or more newly registered domains was observed daily, with fluctuations continuing through the end of the quarter.

This sudden surge could indicate a sign of preparation for upcoming seasonal retail sales or early travel-related promotions, during which many financial institutions roll out offers and rewards, making this period a prime target for cybercriminals looking to spoof legitimate offers.

You can read the report here: https://bfore.ai/report/bec-in-the-financial-services-sector/

Deepgram Expands Internationally, Launches Managed Single-Tenant Deployment Option

Posted in Commentary with tags on July 30, 2025 by itnerd

Voice AI is rapidly becoming foundational infrastructure across industries, powering real-time agents, compliance-sensitive workflows, and multilingual applications at scale. As global adoption accelerates, so does the demand for flexible deployment models, regional hosting, and production-grade reliability.

To meet that demand, Deepgram is announcing two major infrastructure expansions:

  • The general availability of Deepgram Dedicated, a fully managed, single-tenant runtime
  • The early access launch of our EU-hosted API endpoint, enabling in-region inference for European workloads

These launches reflect a broader shift in how voice AI is being deployed, and they come at a time of growing industry validation. This month, Deepgram Nova-3 was named a 2025 Voice AI Technology Excellence Award winner by TMC’s CUSTOMER magazine, recognizing their leadership in accuracy, real-time multilingual transcription, and self-serve customization.

Together, these milestones reinforce Deepgram’s commitment to providing voice AI infrastructure that supports enterprise-scale performance, compliance, and geographic flexibility.

What It Means to Go Global with Voice AI

Going global starts with supporting the world’s languages. Deepgram already supports over 36 languages for customers worldwide and will continue expanding language coverage throughout 2025. 

But language support is only the beginning.

For engineering teams building production-grade systems, global voice AI also requires solving for infrastructure and compliance demands as workloads expand across regions. As enterprises scale voice workloads globally, we continue to hear two common friction points: the growing complexity of managing infrastructure across regions and tightening data policies, particularly in the EU, that require stricter control over where and how voice data is processed.

These demands include:

  • Ultra low-latency inference paths. Real-time applications require models to run as close to the end user as possible to minimize round-trip time and meet interaction thresholds.
  • Data residency and legal jurisdiction. Voice data often must be processed and stored within specific geographic boundaries to meet regulatory requirements such as GDPR.
  • Single-tenant isolation for sensitive workloads. Some environments require dedicated infrastructure to enforce data segregation, meet compliance standards, or satisfy internal security policies.
  • Scalable operations without added DevOps burden. Expanding voice workloads across regions should not require a proportional increase in infrastructure engineering.

Deepgram’s platform was designed with these requirements in mind, providing the foundation needed to operationalize voice AI reliably and securely across global environments.

Introducing Deepgram Dedicated: A Managed, Single-Tenant Runtime

Enterprises adopting voice AI at scale often face a difficult tradeoff: maintain control over infrastructure and data by self-hosting, or prioritize ease of use through shared, multi-tenant cloud APIs. Self-hosting offers isolation and regional control, but introduces significant ongoing operational complexity. Managed service providers can help bridge the gap, but they often lack product-level expertise and introduce dependency overhead that slows down feature adoption.

Now generally available, Deepgram Dedicated closes this gap. It is a fully managed, single-tenant deployment of Deepgram’s voice AI platform that offers the control and flexibility of self-hosted infrastructure without the burden of operating it. Over the past six months, it has been selectively deployed with a select group of enterprise customers in early production deployments across a range of use cases, from real-time contact center platforms to globally distributed voice agents.

Teams gain regional isolation, performance control, and compliance alignment while offloading infrastructure management to Deepgram. Deepgram Dedicated currently runs on AWS, with support for additional cloud providers on the roadmap.

Key Highlights:

  • Single-tenant architecture: Each deployment runs on isolated compute, avoiding noisy neighbor effects and supporting strict data segregation.
  • Unified voice AI stack: Run speech-to-texttext-to-speech, and speech-to-speech workloads in a single runtime with consistent API behavior.
  • Multi-cluster design: Separates real-time, pre-recorded, and agent workloads onto specialized clusters to maximize performance, ensure high availability, and enable strict workload isolation.
  • Region-specific infrastructure: Deploy in your preferred cloud region to meet compliance requirements, enable ultra-low latency, and align with internal policies, including support for country-level deployments.
  • SLA-backed performance: Optional SLAs ensure predictable uptime and latency with defined targets monitored and enforced by Deepgram.

In one modeled scenario, a customer supporting 1,000 concurrent real-time streams would spend approximately $467K USD annually if self-hosting. This includes $250K in DevOps headcount and $98K in infrastructure costs.

Running the same workload on Deepgram Dedicated lowers total OPEX by approximately $98K USD per year. It also reduces engineering overhead and improves deployment reliability through platform-managed SLAs and regional isolation, giving teams more time to focus on higher-impact work.

EU-Hosted API Endpoint: In-Region Inference for European Voice Workloads

Voice AI adoption is accelerating across Europe, driven by demand for real-time applications in finance, public services, retail, and telecommunications. To date, more than two dozen customers and prospects have expressed interest in EU-based infrastructure, highlighting growing demand for in-region processing that meets local performance expectations and regulatory requirements without compromising model quality or flexibility.

To support this, Deepgram is launching early access to api.eu.deepgram.com, a new EU-hosted speech-to-text API endpoint that delivers in-region inference with full feature parity and consistent performance. The EU endpoint is hosted in AWS EU regions, with additional hosting options under consideration.

Key Highlights:

  • Voice data stays within the EU. All processing occurs inside EU-based AWS regions, ensuring no cross-border data transfer.
  • Latency improvements for EU-based users: Localized inference reduces round-trip time for applications serving users in or near the EU.
  • No code changes required: Existing integrations can migrate by updating the base URL, with no other changes needed.
  • Supports GDPR compliance and auditability: The deployment is fully isolated within the EU legal boundary and aligned with regional data protection standards.

This endpoint is well-suited for European ISVs, compliance-focused enterprises, and global teams looking to reduce latency and streamline deployment in the EU.

Why This Matters: A Global-Ready Voice AI Platform

With these additions, Deepgram now supports a range of deployment options, including multi-tenant hosted APIs, fully managed single-tenant deployments, and customer-operated self-hosted infrastructure. This flexibility allows engineering teams to choose the right model based on their application requirements, compliance obligations, and operational preferences. For some, the hosted API provides a fast path to integration. Others may require the regional data residency of the EU endpoint or the isolation and control of a Dedicated deployment. Teams with existing DevOps capacity may opt for self-hosting to align with internal security policies or infrastructure standards.

What differentiates Deepgram is the ability to deliver true flexibility across deployment models. Teams can build and scale voice AI systems using consistent APIs and model performance, while choosing the infrastructure that fits their environment. Looking ahead, the roadmap includes customer VPC deployments, BYOC support, and expanded region availability across Asia-Pacific, EMEA, and LATAM.

Start Building for Your Environment

If you’re building voice applications that require global reach, regulatory alignment, or low-latency performance, now is the time to explore your deployment options. Demand is high, and we’re expanding access selectively:

Deepgram now runs where your business runs. No trade-offs. No overhead. Just voice AI on your terms.