Security & Trust

Your Data Is Sacred. We Treat It That Way.

Your procurement data, your vendor relationships, your pricing intelligence—we protect them with the same vigilance you would.

AES-256 Encryption
SOC 2 Infrastructure
Per-Tenant Isolation
Full Audit Trail

Enterprise-Grade Protection

Built for organizations that can't afford to compromise.

End-to-End Encryption

All data encrypted in transit and at rest using AES-256. Your specs never travel unprotected.

Isolated Environments

Each partner operates in a dedicated, isolated environment. Your data never mingles with others.

Role-Based Access

Granular permissions ensure team members only see what they need. Full audit trails for compliance.

No Model Training

Your data is never used to train AI models. It processes, returns results, and stays yours.

24/7 Monitoring

Continuous security monitoring detects and responds to threats before they become problems.

Automatic Backups

Your data is backed up continuously with point-in-time recovery. Never lose a quote.

What We Protect

  • Customer specifications and RFQs
  • Your vendor quotes and pricing intelligence
  • Procurement decision history and audit trails
  • Historical comparisons and vendor performance data
  • User credentials and access logs
  • Integration credentials and API keys

Your Rights

  • Export your data anytime, in standard formats
  • Request complete deletion upon contract end
  • Access audit logs of all data operations
  • Receive breach notifications within 24 hours
  • Security review process being formalized
  • Contact founders directly for security questions

Security Infrastructure

SOC 2
Infrastructure (Supabase + Vercel)
SOC 2
Own Cert — In Progress (Target Q4 2026)
GDPR
Principles Applied — Formal Docs In Progress
TLS 1.3
Encryption In Transit

Questions About Security?

We're happy to discuss our security practices in detail and provide documentation. Contact the founders directly — security is a first-class concern.

Get In Touch