Security and Data Practices
Data Practices
Single-tenant isolation
Each project is provisioned as its own tenant container, with separate data stores (knowledge graph + file storage).
Tenants do not share databases, indices, or file buckets, which prevents cross-customer data paths and eliminates commingling.
Always-on encryption
All customer data is encrypted at rest and in transit using modern, industry-standard cryptography.
For customers with stricter key governance, we support Bring Your Own Key (BYOK), enabling you to control key generation, storage, rotation, and revocation in your own KMS/HSM.
No training on your data
Your data is used to serve your organization. Period.
We do not use customer data to train foundation models or to build derivative LLMs shared across customers. You retain full control of your data and its lifecycle.
Identity & Integrations
Enterprise ready auth
We integrate with your IdP via SAML 2.0 or OIDC (Okta, Microsoft Entra ID / Azure AD, Google, and others).
SCIM supports automated user lifecycle management (provisioning, de-provisioning, group sync).
Built-in role-based access control (RBAC) restricts access by project and role.Integrate SSO with your IdP using SAML 2.0/OIDC (Okta, Microsoft Entra ID/Azure AD, Google, etc.).
Procore and Autodesk
Native connectors integrate with Procore and ACC to ingest, synchronize, and reason over project artifacts.
Additional integrations enabled on request.
Minimal permission scopes
Integrations request only the specific, minimal scopes required to deliver agreed functionality.
Access tokens and permissions are limited and can be revoked at any time by your admins.

SOC 2 Type II compliant
Report on request.