Enterprise-grade security

Your data stays yours. Always.

AES-256

Encryption at rest

TLS 1.3

In-transit protection

SOC 2

Compliance aligned

0

Data used for training

Built for trust

Data privacy

Your content, sources, and outputs are never shared across organizations. Customer data is isolated and private.

Encryption at rest & in transit

All data is encrypted with AES-256 at rest and TLS 1.3 in transit. Industry-standard protection for everything you store.

Role-based access

Owner, Admin, Strategist, Editor, Viewer, Client Reviewer - granular control over who sees and edits what.

Full audit trails

Every generation, edit, share, and export is logged. Complete transparency for compliance and governance.

No model training

Your content is never used to train shared AI models. Your intellectual property stays yours.

SOC 2 aligned

Infrastructure and processes aligned with SOC 2 Type II standards. Enterprise-ready from day one.

Security architecture

Application Layer

Role-based accessAudit loggingTenant isolation

Transport Layer

TLS 1.3Certificate pinningHSTS

Storage Layer

AES-256Key managementEncrypted backups

Infrastructure Layer

VPC isolation24/7 monitoringDisaster recovery

Permission roles

Six distinct roles for precise access control across your organization.

Owner

  • Full platform access
  • Billing management
  • Organization deletion

Admin

  • Manage team members
  • Access all projects
  • Organization settings

Strategist

  • Create and manage projects
  • Use and configure agents
  • Export deliverables

Editor

  • Edit content and outputs
  • Upload sources

Viewer

  • Read-only access

Client Reviewer

  • View shared outputs
  • Add comments and feedback

Security questions?

Our team is happy to walk you through our security practices and compliance posture.