Product · Security

Bank-grade encryption & absolute isolation.

Your financial data demands uncompromising security. Here's exactly how we protect it.

AES-256 Encryption at Rest

All tenant data, configurations, and API keys are heavily encrypted in our cloud databases using the AES-256 standard — the same encryption used by the NSA for top-secret data.

Strict Tenant Isolation

Our multi-tenant architecture ensures your ledger data can never bleed into another user's workspace. Dedicated schemas, row-level security, and audited access controls.

Zero-Training Policy

If you use the BYOK feature, your data is passed directly to the AI provider via API. We never use your financial data to train our own models — or anyone else's.

Local PDF Parsing

Text is extracted from your documents directly within your browser. Raw files never sit vulnerable on our servers — only the extracted text is processed.

Enterprise security architecture documentation and vendor (GCP, Vercel) SOC 2 Type II reports available to qualified customers under NDA. Our own SOC 2 attestation is in progress.

Request security review