Security

Built for security and control

Enterprise-grade security with flexible deployment options. Your data, your control.

Security features

Encryption at rest

All data encrypted with AES-256. Credentials never stored in plain text.

Encryption in transit

TLS 1.3 for all data in transit. End-to-end encryption standard.

Access control

Granular permissions. Read-only by default. Approve high-risk actions.

Audit logging

Every query and action logged. Export audit trails for compliance.

Data isolation

Your data never commingles. Self-hosted keeps everything in your infrastructure.

Key rotation

Rotate credentials anytime. Automatic key rotation for managed deployments.

How we handle your data

Cloud-hosted

Data encrypted in transit and at rest. Queries processed through secure tunnels. No persistent storage of query results unless explicitly enabled.

Self-hosted

Complete data isolation. Everything runs in your infrastructure. No data leaves your environment. Full control over access and retention.

AI processing

Bring your own AI key or use ours. Schema metadata only sent to AI providers. Query results stay in your environment.

Data flow diagram

Your Database
Encrypted Tunnel
AI for Database
AI Provider (Optional)
Your Dashboard
Your Actions

Compliance ready

SOC 2

Type II Certified

GDPR

Compliant

HIPAA

Available

ISO 27001

Aligned

Need enterprise security?

Talk to us about self-hosted deployment and custom security requirements.