Transparency, security, and compliance are foundational to everything we build. Explore our certifications, architecture, and commitments.
Independently audited for security, availability, processing integrity, confidentiality, and privacy controls.
Request Report βInformation security management system aligned with ISO 27001 international standards.
Learn More βFull compliance with the General Data Protection Regulation for EU data subjects.
Privacy Policy βCalifornia Consumer Privacy Act compliance for California residents.
Privacy Policy βSelf-hosted deployment option enables HIPAA-compliant security operations for healthcare organizations.
Learn More βWorking toward FedRAMP authorization for federal government deployments.
Contact Us βOur architecture is designed with security-first principles, giving you complete control over your data.
Bring Your Own Database means your security data never leaves your infrastructure.
Complete isolation between customers in our multi-tenant SaaS environment.
Control your AI processing with your own models.
Industry-standard encryption for all data, everywhere.
Fully managed with enterprise-grade security
| Infrastructure | AWS / Azure (SOC 2, ISO 27001) |
| Tenant Isolation | Cryptographic + Logical |
| Data Residency | US, EU, APAC regions available |
| Encryption | TLS 1.3 + AES-256 |
| Access Control | SSO, MFA, RBAC |
| Audit Logging | Complete + Exportable |
| Penetration Testing | Annual third-party |
| Uptime SLA | 99.9% |
Complete control in your environment
| Infrastructure | Your choice (any cloud / on-prem) |
| Tenant Isolation | Dedicated instance |
| Data Residency | 100% your control |
| Encryption | Your keys, your policies |
| Access Control | Your identity provider |
| Audit Logging | Your SIEM / logging |
| Air-Gapped | Fully supported |
| Source Code Review | Available for enterprise |
Enterprise customers can request access to detailed security documentation:
Have a security question or need to report a vulnerability?