Trusted by infosec.
Loved by admins.
Frontier AI technology grounded in enterprise-grade security, transparent compliance, and a zero-knowledge architecture. Trusted by public enterprises, government institutions, and breakout startups worldwide.
Compliant with
Data Isolation
Customer data is logically isolated by tenant with strict authorization controls.
Access Controls
Role-based access control, multi-factor authentication, and audited administrative access.
Secure Development
Enterprise-grade software development lifecycle practices and security scanning.
Encryption
All data is encrypted in-transit and at rest using industry-leading cryptographic protections.
Resilience
Regular backups, continuous monitoring, and tested recovery procedures.
Transparency
Compliance and security documentation available in our Trust Center.
Least privilege by default across systems and people
Continuous vulnerability scanning across app, data, and infrastructure layers
Auditability with comprehensive logging and monitoring
Customer control over data sources, permissions, and retention
Customer data is used to provide the service, not to train shared models
Tenant-scoped retrieval and indexing
Access-controlled connectors and source permissions
Administrative controls limit what content is searchable and by whom
Responses can include references so users can verify accuracy
Encryption in-transit using TLS 1.3 or higher (when available)
Encryption at rest using AES-256 encryption
Support for customer-defined encryption keys for added security and compliance
Authentication via 2FA by default with support for SSO/SAML
Role-based access control for all permissioned actions
Centralized logging and alerting with defined escalation paths and response playbooks
Regular backups and restore procedures
Annual disaster recovery planning and testing cadence
Configurable RPO/RTO targets for enterprise plans

