SECURITY & COMPLIANCE
Comprehensive protection built into every layer of the architecture, not as an afterthought
Security is woven into the core architecture. From authentication to programming – every element is engineered with protection as a priority.
Integration with OIDC for modern, standardized authentication protocols
LDAP support for seamless integration into existing user structures
Backend written 100% in Rust for maximum system stability and memory integrity
On-premise option for complete control over company data ²³
Built-in data protection principles ensure maximum sovereignty over your information.
No storage of prompts or conversations
No use of data for model training
Protected data transmission through TLS 1.2/1.3 encryption
Zero-retention principle
Full GDPR compliance in all processes
Data processing exclusively within the company ²³
The platform undergoes rigorous testing to maintain the highest standards and protection against emerging threats.
Regular penetration tests by independent experts
Continuous vulnerability analysis and immediate remediation
Comprehensive vendor management for the entire value chain
Our development and support processes are built around security principles that protect your implementation.
Exclusive use of managed and protected devices
Regular security training for all team members
Internal compliance audits to ensure all standards are met
The security framework of the platform is constantly evolving to meet emerging standards and threats.
ISO 27001 certification process in active preparation
Implementation of a comprehensive Information Security Management System (ISMS)
Alignment of processes with NIS2 requirements
Notes on Deployment Options:
¹ Applies to cloud version with limitations
² Applies to on-premise version
³ Applies to server leasing