Your data stays yours.
Security isn't a feature we added. It\u2019s the foundation everything else is built on.
Security Details
Your Data, Your Control
Every Eidetic agent runs in dedicated, isolated infrastructure. At Manager tier and above, there is zero shared tenancy — your agent operates in its own environment with its own resources. Your data never touches another client’s workload.
Never Trains Models
Your business data is never used to train, fine-tune, or improve AI models. Not ours, not anyone else’s. Your conversations, documents, and operational data exist solely to serve your agent’s memory and your business outcomes.
Approval Gates
Every high-stakes action requires your explicit approval. Sending emails to clients, executing transactions, modifying data — your agent asks before acting. You control the level of autonomy, and you can adjust it at any time.
Encryption & Access Control
All data is encrypted at rest (AES-256) and in transit (TLS 1.3). Credentials are isolated per client using dedicated secret stores. Access is governed by the principle of least privilege — your agent only has access to the tools and data you explicitly authorize.
Budget Controls
Hard spending limits on LLM usage prevent runaway costs. Rate limiting, shell allowlists, and execution sandboxes ensure your agent operates within defined boundaries. You set the limits; we enforce them.
Compliance
We are actively pursuing SOC 2 Type II certification. Our infrastructure is GDPR-ready with data residency options available for enterprise clients. We maintain detailed audit logs of all agent actions for your review.
Encryption
AES-256 + TLS 1.3
Compliance
SOC 2 (in progress)
Data Residency
US, EU available
Questions about security?
Our team is happy to walk you through our security architecture in detail.
Talk to Us