
[z8Sp;+Ev>dzH?@e Rt(r^X[a
Enterprise security, tenant isolation, content guardrails, and dedicated deployment options. Built for teams that take security seriously.
Platform Security Highlights
Self-hosted infrastructure
Your data never leaves your servers
SSRF protection
Deny policies on all ingestion pipelines
JWT tenant isolation
Authentik OIDC with per-tenant scoping
Role-based tool access
FilteredToolset with scoped permissions
Graph-memory isolation
Per-tenant group scoping on all memory
No telemetry
Zero data sent to third parties
Open-source stack
CE/auditable components throughout
SOC 2 readiness
Lago billing audit trail built in
Data Sovereignty
Your data is encrypted at rest and in transit, isolated per tenant, and never shared across accounts. We never train models on your data. For teams with strict compliance requirements, our Sovereign plan offers dedicated infrastructure options.
Encryption
All data in transit is encrypted via TLS 1.3 with automated certificate management. Data at rest is encrypted at the filesystem level. Database connections use SSL. API keys and secrets are managed with AES-256 encryption.
Authentication & Access Control
Enterprise-grade SSO with OIDC, SAML, and social login support. All platform services share a single identity provider. JWT-based authentication with per-tenant scoping ensures users only access their own resources. Role-based access control across all platform components.
Multi-Tenant Isolation
Every tenant's data is isolated at multiple layers: graph memory, vector search, API gateway, and billing — each with independent tenant scoping. Tenants cannot access each other's data, models, or usage metrics.
Dedicated Deployment
For regulated industries and enterprises that need it, our Sovereign plan offers dedicated infrastructure in your preferred region. Full compliance controls, custom networking, and audit trails included. No telemetry, no shared resources.
Content Guardrails
Two-layer content safety: regex-based pattern matching for known injection patterns, plus LLM-powered classification for nuanced threats. Prompt injection detection with heuristic gating to minimize false positives. Master key bypass for administrative operations.
No Training on Your Data
We never train models on customer data. All inference runs through providers with strict data processing agreements that prohibit training. Your conversations, documents, and knowledge graphs belong to you — always.
Infrastructure & Backups
Automated daily backups with 7-day retention. Three-layer monitoring covers availability, resource health, and LLM quality. All infrastructure protected by enterprise-grade edge routing with automated TLS certificate management.
Have security questions?
Contact us at [email protected] for security assessments, compliance documentation, or to discuss your requirements.