Security

[z8Sp;+Ev>dzH?@e Rt(r^X[a

Enterprise security, tenant isolation, content guardrails, and dedicated deployment options. Built for teams that take security seriously.

Platform Security Highlights

Self-hosted infrastructure

Your data never leaves your servers

SSRF protection

Deny policies on all ingestion pipelines

JWT tenant isolation

Authentik OIDC with per-tenant scoping

Role-based tool access

FilteredToolset with scoped permissions

Graph-memory isolation

Per-tenant group scoping on all memory

No telemetry

Zero data sent to third parties

Open-source stack

CE/auditable components throughout

SOC 2 readiness

Lago billing audit trail built in

Data Sovereignty

Your data is encrypted at rest and in transit, isolated per tenant, and never shared across accounts. We never train models on your data. For teams with strict compliance requirements, our Sovereign plan offers dedicated infrastructure options.

Encryption

All data in transit is encrypted via TLS 1.3 with automated certificate management. Data at rest is encrypted at the filesystem level. Database connections use SSL. API keys and secrets are managed with AES-256 encryption.

Authentication & Access Control

Enterprise-grade SSO with OIDC, SAML, and social login support. All platform services share a single identity provider. JWT-based authentication with per-tenant scoping ensures users only access their own resources. Role-based access control across all platform components.

Multi-Tenant Isolation

Every tenant's data is isolated at multiple layers: graph memory, vector search, API gateway, and billing — each with independent tenant scoping. Tenants cannot access each other's data, models, or usage metrics.

Dedicated Deployment

For regulated industries and enterprises that need it, our Sovereign plan offers dedicated infrastructure in your preferred region. Full compliance controls, custom networking, and audit trails included. No telemetry, no shared resources.

Content Guardrails

Two-layer content safety: regex-based pattern matching for known injection patterns, plus LLM-powered classification for nuanced threats. Prompt injection detection with heuristic gating to minimize false positives. Master key bypass for administrative operations.

No Training on Your Data

We never train models on customer data. All inference runs through providers with strict data processing agreements that prohibit training. Your conversations, documents, and knowledge graphs belong to you — always.

Infrastructure & Backups

Automated daily backups with 7-day retention. Three-layer monitoring covers availability, resource health, and LLM quality. All infrastructure protected by enterprise-grade edge routing with automated TLS certificate management.

Have security questions?

Contact us at [email protected] for security assessments, compliance documentation, or to discuss your requirements.

Generate One

Ask me anything about the platform!

Powered by CopilotKit