Enterprise-grade security
Your data stays yours. Always.
AES-256
Encryption at rest
TLS 1.3
In-transit protection
SOC 2
Compliance aligned
0
Data used for training
Built for trust
Data privacy
Your content, sources, and outputs are never shared across organizations. Customer data is isolated and private.
Encryption at rest & in transit
All data is encrypted with AES-256 at rest and TLS 1.3 in transit. Industry-standard protection for everything you store.
Role-based access
Owner, Admin, Strategist, Editor, Viewer, Client Reviewer - granular control over who sees and edits what.
Full audit trails
Every generation, edit, share, and export is logged. Complete transparency for compliance and governance.
No model training
Your content is never used to train shared AI models. Your intellectual property stays yours.
SOC 2 aligned
Infrastructure and processes aligned with SOC 2 Type II standards. Enterprise-ready from day one.
Security architecture
Application Layer
Transport Layer
Storage Layer
Infrastructure Layer
Permission roles
Six distinct roles for precise access control across your organization.
Owner
- Full platform access
- Billing management
- Organization deletion
Admin
- Manage team members
- Access all projects
- Organization settings
Strategist
- Create and manage projects
- Use and configure agents
- Export deliverables
Editor
- Edit content and outputs
- Upload sources
Viewer
- Read-only access
Client Reviewer
- View shared outputs
- Add comments and feedback
Security questions?
Our team is happy to walk you through our security practices and compliance posture.
