SOC 2 Type 2
Security, controls and data handling processes validated by third parties.
Data isolation
Data is isolated for each customer, ensuring privacy and secure usage.
LLM privacy
Data sent to LLM providers is neither stored nor used for training purposes by LLM provider.
Penetration testing
Regular third-party penetration tests conducted to identify and rectify vulnerabilities proactively.


