Security
Built for security and control
Enterprise-grade security with flexible deployment options. Your data, your control.
Security features
Encryption at rest
All data encrypted with AES-256. Credentials never stored in plain text.
Encryption in transit
TLS 1.3 for all data in transit. End-to-end encryption standard.
Access control
Granular permissions. Read-only by default. Approve high-risk actions.
Audit logging
Every query and action logged. Export audit trails for compliance.
Data isolation
Your data never commingles. Self-hosted keeps everything in your infrastructure.
Key rotation
Rotate credentials anytime. Automatic key rotation for managed deployments.
How we handle your data
Cloud-hosted
Data encrypted in transit and at rest. Queries processed through secure tunnels. No persistent storage of query results unless explicitly enabled.
Self-hosted
Complete data isolation. Everything runs in your infrastructure. No data leaves your environment. Full control over access and retention.
AI processing
Bring your own AI key or use ours. Schema metadata only sent to AI providers. Query results stay in your environment.
Data flow diagram
Compliance ready
Type II Certified
Compliant
Available
Aligned
Need enterprise security?
Talk to us about self-hosted deployment and custom security requirements.