Security
Security & compliance posture
We follow SOC 2-style controls (not yet certified) with strong encryption, access governance, and auditability built in from day one.
Encryption
Data encrypted in transit and at rest, with strict key rotation and comprehensive access logging.
Access control
Role-based access, least privilege, and tenant isolation prevent any cross-client access.
Auditability
Model outputs and insight runs are logged with timestamps for full traceability and compliance evidence.
Incident response
Defined escalation paths, monitoring, and notification policies for security events of any severity.