Trust & Security
Enterprise-grade security for your most sensitive operations.
Security
Encryption everywhere
All data is encrypted in transit (TLS 1.3) and at rest (AES-256). No exceptions.
Least-privilege access
AI workers only access what they need, when they need it. Permissions mirror your human workers.
Zero data retention
We process your data in real-time and retain nothing beyond active workflows.
Privacy
Your data stays yours
We never train foundation models on your data. Your workflows and information remain confidential.
No third-party sharing
Your data is never sold, shared, or used for any purpose other than running your AI workers.
Data residency options
Choose where your data is processed and stored to meet regulatory requirements.
Controls
Human-in-the-loop everywhere
You decide which actions require approval. Start with everything on approval, then relax as you build confidence.
Real-time monitoring
See what every AI worker is doing, in real-time. Pause or override any action instantly.
Granular permissions
Control access down to individual fields and actions, just like you would with human employees.
Auditability
Complete audit trails
Every action is logged with who, what, when, and why. Export logs for compliance or review.
Change tracking
See exactly what was modified, by which worker, with before/after snapshots.
Compliance reporting
Generate reports for auditors showing access patterns, approvals, and system changes.
Compliance
SOC 2 Type II certification in progress
We're committed to meeting the highest standards of security and compliance for enterprise customers.
Security FAQ
Request Security Brief
Get detailed documentation on our security architecture, compliance roadmap, and data protection measures.