Marka

Security

Security & compliance posture

We follow SOC 2-style controls (not yet certified) with strong encryption, access governance, and auditability built in from day one.

Encryption

Data encrypted in transit and at rest, with strict key rotation and comprehensive access logging.

Access control

Role-based access, least privilege, and tenant isolation prevent any cross-client access.

Auditability

Model outputs and insight runs are logged with timestamps for full traceability and compliance evidence.

Incident response

Defined escalation paths, monitoring, and notification policies for security events of any severity.