Security

Built from the ground up to be secure

Enterprise-grade security built into every layer — from infrastructure to access controls to code. We handle data the right way.

AWS Infrastructure
256-bit Encryption
SOC 2 In Progress
Data Isolation

Security at Every Layer

Data Encryption

All data encrypted at rest with AES-256 and in transit with TLS 1.3. Encryption keys managed through AWS KMS with automatic rotation.

Raw Data
AES-256
email:
user@company.com
name:
John Smith
card:
4242-4242-4242
Unencrypted data

Access Control

Role-based permissions with SSO support via Clerk. MFA enforcement and granular team-level controls.

SSO
MFA
Admin
Scanning...

Data Isolation

Multi-tenant architecture with per-tenant database isolation. Query-level enforcement prevents cross-tenant access.

Tenant A
Locked
No Access
Tenant B
Locked
No Access
You
Locked
No Access
Only you have the key to your data

Audit Logging

Complete audit trail of every action — who accessed what, when. Built for compliance and investigation.

Live
14:32:05sarah@acme.com
14:31:48john@acme.com
14:30:22admin@acme.com
14:29:15sarah@acme.com
AI & Your Data

AI-powered analytics, without compromise

Our AI features help you analyze data faster — but we never compromise on security. Here's how we keep your data safe while delivering intelligent insights.

  • Only schema and metadata are sent to AI models — never your raw data
  • Enterprise plans can disable AI features entirely
  • Your data is never used to train AI models
  • All AI interactions are logged for audit purposes
Your Data
Stays in your environment
AI Processing
Schema & metadata only
Intelligent Insights
Delivered securely to you

Questions about security?