Powerful enough to run the workflow.
Constrained enough to defend in audit.
Trust is not a section in the security pack. It is the way the product is built. Tenant-isolated, deterministic, reversible, audit-friendly by default.
Five rules,
baked into the architecture.
The product cannot violate them, and we cannot quietly turn them off. Procurement reads the same architecture diagram you do.
Tenant-isolated by design.
Every workspace gets its own encryption key, its own object store, and its own queue partition. There is no shared schema with a tenant_id column path. We picked the harder architecture so you do not have to trust our row filters.
Customer data is never used for training.
Not in our models, not in foundation-model providers' models, not in opaque improvements. We pay providers explicitly to disable training on our traffic, and we publish the contracts on request.
Deterministic agents over stochastic ones.
An LLM picks the plan. The platform runs governed SQL against governed definitions. Every answer carries the SQL trace, the source rows, and a confidence signal so you can defend it to the audit committee.
Every action is reversible.
If the platform writes back to Slack, your warehouse, or your CRM, the write is logged, attributed, and revocable from the audit page. No one, including us, can move on a customer system without leaving a trace.
Audit-friendly by default.
SSO, SCIM, exportable audit logs, immutable change history on metric definitions, and a procurement pack that ships with the trial, not after a six-week security review.
Compliance is the floor.
The product is the wall.
Frameworks tell you a vendor passed an audit. The architecture tells you whether it can fail you in the first place.
GDPR-aligned
DPA on first contact. EU region pinning. Subject access requests handled in-product, not over email.
SOC 2 Type II
Audit underway · Q3 2026. Real-time controls dashboard available to enterprise customers from day one.
HIPAA-ready
For health-tech customers: BAAs available, PHI redaction at the connector layer, and additional access logs.
Trust is a product feature.
Bolting it on later never works.
Walk through the architecture, the DPA, the sub-processor list, and the audit logs with the platform team in one 45-minute call.
DataAgents