Security
Built for security and control
Enterprise-grade security with flexible deployment options. Your data, your control.
Security features
Encryption at rest
All data encrypted with AES-256. Credentials never stored in plain text.
Encryption in transit
TLS 1.3 for all data in transit. End-to-end encryption standard.
Access control
Granular permissions. Read-only by default. Approve high-risk actions.
Audit logging
Every query and action logged. Export audit trails for compliance.
Data isolation
Your data never commingles. Self-hosted keeps everything in your infrastructure.
Key rotation
Rotate credentials anytime. Automatic key rotation for managed deployments.
How we handle your data
Cloud-hosted
Data encrypted in transit and at rest. Queries processed through secure tunnels. No persistent storage of query results unless explicitly enabled.
Self-hosted
Complete data isolation. Everything runs in your infrastructure. No data leaves your environment. Full control over access and retention.
AI processing
Schema metadata only sent to AI providers. Query results stay in your environment. Choose free or premium models — you control what's used.
Data flow diagram
Built for compliance
Enterprise Ready
Designed For
Enterprise Available
Aligned
Need enterprise security?
Talk to us about self-hosted deployment and custom security requirements.