Safe AI with enterprise-grade security

Valkai is built from the ground up with security in mind. We use industry-standard security practices and protocols to protect your data and ensure the confidentiality, integrity, and availability of our services.

SOC 2 Icon

Soc 2 Type II Certified

The most comprehensive certification that our system is designed to keep our customers' sensitive data secure.

Lock Icon

Secure encryption of data

All customer data is encrypted at rest with FIPS 140-2 validated crypto module utilizing AES 256 bit encryption. All data in transit is encrypted using TLS 1.2+.

ISO 27001 Icon

ISO 27001

The international standard for information security management.

GDPR Icon

GDPR compliant

Customers' personal information is maintained and secured in accordance with the EU's General Data Protection Regulation (GDPR).

Secure data practices and standards

Our resilient platform & practices protect your privileged data with end-to-end encryption, whether in storage or in transit.

Authenticated search

All Valkai access requires authentication via your enterprise's identity provider. Leverage your existing SSO setup.

Indexing controls

Control what data Valkai crawls and indexes. Prevent Valkai from surfacing results for certain search terms.

Strict permissions enforcement

Valkai only shows you the information you already have permission to access in the source application.

Single tenant

All your data is only in your own VPC.

Hosting options

You choose whether you deploy Valkai in your private cloud tenant, or leverage Valkai's fully-managed SaaS experience.

Audit logging

Access comprehensive and configurable audit logging of your company's Valkai usage. Export audit logs to your SIEM for monitoring and alerting.

Industry-leading security practices

Infrastructure Security

  • Network segmentation and isolation
  • Regular security audits and penetration testing
  • Secure data centers with 24/7 monitoring
  • Redundant systems and backup procedures

Access Control

  • Role-based access control (RBAC)
  • Multi-factor authentication (MFA)
  • Regular access reviews and audits
  • Secure password policies and management

Compliance

We maintain compliance with relevant data protection regulations and industry standards. Our security practices are regularly reviewed and updated to meet evolving security requirements.