Security and compliance by design
Enterprise-grade protection for your AI systems. Built on zero-trust principles with comprehensive audit trails.
Data Handling
Your data is encrypted, isolated, and never used to train models.
Encryption in transit
All data transmitted to and from our platform uses TLS 1.3 with strong cipher suites. We enforce HTTPS everywhere with HSTS preloading.
Encryption at rest
All stored data is encrypted using AES-256. Encryption keys are managed via a dedicated KMS with automatic rotation.
Data isolation
Customer data is logically isolated at the database level. Enterprise and Regulated tiers support dedicated infrastructure.
No model training
We never use your prompts, completions, or documents to train any models. Your data remains yours.
Deployment Options
Choose the deployment model that fits your security requirements.
SaaS (Multi-tenant)
Fully managed cloud deployment with logical data isolation. Available in US, EU, and APAC regions. Ideal for most teams.
VPC Deployment
Run the platform in your own AWS, GCP, or Azure VPC. You control network boundaries while we handle updates and maintenance.
On-Premises
Full air-gapped deployment in your data center. Includes offline licensing and dedicated support. Available for Regulated tier.
Access Control
Fine-grained permissions with enterprise identity integration.
SSO/SAML
Integrate with Okta, Azure AD, Google Workspace, or any SAML 2.0 / OIDC provider. Enforce MFA at the identity provider level.
Role-Based Access Control
Define custom roles with granular permissions. Control access to projects, data sources, models, and admin functions.
API Key Management
Scoped API keys with expiration, IP allowlists, and usage limits. Rotate keys without downtime.
Session Management
Configurable session timeouts, concurrent session limits, and forced logout capabilities for security incidents.
Logging & Audit
Complete visibility into every action for compliance and forensics.
Comprehensive audit logs
Every API call, user action, and system event is logged with timestamp, actor, IP, and payload hash.
Immutable logs
Regulated tier includes tamper-proof audit logs with cryptographic verification. Logs cannot be modified or deleted.
SIEM integration
Stream security events to Splunk, Datadog, or any SIEM via webhook or syslog. Real-time alerting on suspicious activity.
Log export
Export logs to your own S3, GCS, or Azure Blob storage for long-term retention and compliance.
Data Retention
Configurable retention policies to meet your compliance needs.
Configurable retention
Set retention periods per data type: traces, logs, documents, embeddings. Automatic purging after expiration.
Tier-based defaults
Team: 7 days. Enterprise: 90 days. Regulated: 1+ year with immutable storage options.
Right to deletion
GDPR-compliant deletion workflows. Request deletion of all data associated with a user or project.
Backup & recovery
Daily encrypted backups with point-in-time recovery. Backups retained for 30 days (configurable for Regulated tier).
Incident Response
Proactive monitoring and rapid response to security events.
24/7 monitoring
Our security team monitors for threats around the clock. Automated alerting for anomalous activity.
Incident classification
Incidents are classified by severity (P1-P4) with defined SLAs for response and resolution.
Customer notification
Affected customers are notified within 24 hours of confirmed incidents per our incident response policy.
Post-incident review
Root cause analysis and remediation reports provided for all P1/P2 incidents.
Subprocessors
Transparency about third parties that process your data.
Infrastructure
AWS (US, EU, APAC regions) for compute and storage. Google Cloud Platform for specific ML workloads.
Observability
Datadog for internal monitoring (no customer data). PagerDuty for incident management.
Support
Zendesk for customer support ticketing. Support agents access only metadata, not content.
Updates
Subscribe to subprocessor updates via email. 30-day notice before adding new subprocessors.
FAQ
Security questions
Common questions about our security practices and certifications.
Contact our security team
Have security questions or need to report a vulnerability? We're here to help.