Security

Built to protect
financial data.

Not a checklist. An architecture.

Never used for training

Your documents and extracted data are never used to train models. Processed, delivered, stored under your key.

Authenticated and scoped

Every request is authenticated. Every query is scoped to your organization. No implicit access, no shared state.

Enforced automatically

Encryption, isolation, and access controls are built into the infrastructure. None of it depends on someone remembering to flip a switch.

Encrypted at rest and in transit

All data is encrypted with AES-256 using unique keys per organization. All connections are secured over HTTPS with strict transport security enforced.

Complete tenant isolation

Your data is completely separated from every other customer. Every query is scoped to your organization — there is no way to access another tenant’s data.

Immutable audit trail

Every sensitive operation is logged automatically. Audit entries cannot be edited or deleted, giving you a complete record of all activity.

No LLMs touch your data

Your financial documents are never sent to a large language model. Document processing and parsing is handled by Reducto, a SOC 2 Type II certified platform with a zero data retention policy. All downstream mapping and analysis is fully deterministic.

Reducto Trust Center

Ready to learn more?

Get details on our security architecture.