Built for sensitive insurance data
Controlled review, approval, and release of recurring insurance reporting data — with clear boundaries on access, auditability, deployment, and AI-assisted workflows.
SOC 2 Type II in progress.
Enterprise-grade security
Four foundations protecting how your data is stored, accessed, processed, and operated.
Data encryption & isolation
AES-256 at rest, TLS 1.2+ in transit. Per-tenant separation with source-aware row-level isolation.
Access control
SSO and MFA support. Role-based access scoped by organization, dataset, and source.
Application security
Full audit trail on every change. Deterministic re-imports. Reviewed change management.
Infrastructure security
Hosted on major cloud providers. Monitored access. Regular backups and vulnerability management.
Your data stays yours
Four commitments that govern how AI interacts with your data.
No model training on your data
Your data is not used to train AI models — ours or any third party's.
Human-in-the-loop on AI
AI suggestions for fixes, mappings, or policies are reviewed by a human before they affect production data.
Full export and deletion rights
You can export or delete your data at any time.
Ephemeral AI processing
LLM calls do not retain your data beyond the request.
Built for insurance workflows
Differentiated capabilities for recurring insurance reporting workflows like BDX.
Source-aware row isolation
Each row is stamped with its source so external users see only their data while internal admins retain a unified view.
Deterministic workflow
Same file in, same result out. Re-imports do not create surprise outcomes; edits trigger rechecks only for affected rows.
Auditability
A visible record of what failed, what changed, who changed it, when, what was approved, and what was promoted to reusable mappings or policies.
Private deployments available
Dedicated private deployments may be discussed during evaluation, with clear operating boundaries.
Need security documentation?
Visit the Trust Center for compliance details, sub-processors, and controls — or contact us for the full SOC 2 Type I report.
Visit Trust Center →