Skip to main content

Security & trust

Security isn’t a slide in our deck. It’s in the query path.

Operational intelligence is only credible when the query path is defensible. The platform is built for environments where access reviews matter: governed datasets, explicit permissions, and telemetry that helps your security partners sleep at night.

Control library

Controls we build with your IT team, not instead of them

Row-level security

Data access follows user and role context so the same dashboard definition respects different boundaries automatically.

Field masking

Protect sensitive attributes with masking rules appropriate to analysts vs. operators vs. leadership.

Audit logging

Record queries and meaningful actions to support investigations, compliance questions, and operational forensics.

Authentication hardening

Rate-limited login flows, optional 2FA, and patterns for LDAP/SAML where your IdP is the source of truth.

Self-hosted deployment

Run inside your network boundaries. Data at rest and in transit stays subject to your policies, not ours.

Single-tenant posture

Designed for one organization per deployment, with clean separation and no noisy-neighbor risk.

For security reviewers

Expect a package you can route through GRC

We support architecture reviews with deployment diagrams, data flow descriptions, and enumerations of external dependencies (e.g., identity providers, optional cloud APIs for email analytics). Your assessors define the bar, and we help you show how the product meets it in your configuration.

  • • No public self-service registration in standard deployments.
  • • Administrative user provisioning aligns with your IAM practice.
  • • Health endpoints suitable for uptime monitoring without leaking internals.
  • • API surface documented for controlled integration, not anonymous scraping.

Have a questionnaire or architectural standard to meet? Send it with your intro note. We’ll respond with specifics.