Our security measures

We take a security-first approach, designed for the defense industry.
Our software architecture minimizes reliance on third-parties and our data measures keeps your data private and secure.

Read more below, contact us for more information.

Questions

Where is data stored?

Data resides in secure, geographically distributed data centers within the United States or the EU. We maintain strict access controls and encryption at rest and in transit.

Who can access my data?

Access is strictly limited to authorized personnel. Private data you provide is kept securely and never shared with any external party, except for agreed-upon use cases.

Where is data processed?

Our custom and platform solutions can be run on our servers, on the cloud, or on your private premises. We adapt to your requirements.

Subprocessors

By design, we use a limited set of subprocessors and service providers for non-sensitive data and AI processes. Contact us for more information.

Security certifications

Strong controls are currently in place for data, software, and AI. In addition, we are pursuing security certifications such as ISO 27001, SOC 2, and defense-specific certifications like CMMC 2.0.

Need more information?

Get a detailed briefing on our architecture and security measures from our team