Our security measures
We take a security-first approach, designed for the defense industry.
Our software architecture minimizes reliance on third-parties and our data measures keeps your data private and secure.
Read more below, contact us for more information.
Questions
Data resides in secure, geographically distributed data centers within the United States or the EU. We maintain strict access controls and encryption at rest and in transit.
Access is strictly limited to authorized personnel. Private data you provide is kept securely and never shared with any external party, except for agreed-upon use cases.
Our custom and platform solutions can be run on our servers, on the cloud, or on your private premises. We adapt to your requirements.
By design, we use a limited set of subprocessors and service providers for non-sensitive data and AI processes. Contact us for more information.
Strong controls are currently in place for data, software, and AI. In addition, we are pursuing security certifications such as ISO 27001, SOC 2, and defense-specific certifications like CMMC 2.0.
Need more information?
Get a detailed briefing on our architecture and security measures from our team