Enterprise-grade security, built in from day one

Built for the data you can't afford to expose.

Meets the highest industry standards

SOC 2 Type II

SOC 2 Type II

The most comprehensive security certification ensures our system is designed to keep your sensitive data secure.

AES-256 Encryption

AES-256 Encryption

All data is encrypted at rest using FIPS 140-2 validated crypto module with AES-256-bit encryption. All data in transit uses TLS 1.3+.

GDPR

GDPR

Customer data is maintained and secured in accordance with the EU's General Data Protection Regulation.

Robust measures built into every layer of iGPT to protect your data

Zero Data Retention

Your queries and responses are processed in real-time and never stored.

Zero Data Retention

Zero LLM Training

Your data is never used to train AI models.

Zero LLM Training

Permission-Aware Access

Respects all existing permissions. Users only see data already authorized in source systems.

Permission-Aware Access

AES-256 Per-User Encryption

Every user's data is encrypted with individual keys. Not just tenant-level isolation.

AES-256 Per-User Encryption

Secure API Design

Token-based authentication on every request. Rate limiting, encrypted payloads, and no plaintext endpoints.

Secure API Design

Granular Access Controls

Role-based permissions let you control who can access what, down to specific data sources.

Granular Access Controls

Choose the deployment model that matches your security requirements

Cloud (Fully Hosted)

Cloud (Fully Hosted)

Get started immediately with our secure multi-tenant cloud. SOC 2 certified infrastructure. Data hosted in US and EU regions.

Best for: Teams that want fast deployment without infrastructure overhead.

Hybrid

Hybrid

Keep sensitive data in your VPC while leveraging iGPT's processing power. Your data never leaves your perimeter.

Best for: Organizations with data residency requirements but limited DevOps resources.

Private (On-Premises or VPC)

Private (On-Premises or VPC)

Full deployment within your infrastructure. Complete control over every layer.

Best for: Enterprises with strict compliance requirements or air-gapped environments.

Request our SOC 2 Type II Report