Enterprise-Grade Security for the Documents That Matter Most

Every design decision in Inkscribe AI Enterprise starts with security. From architecture to access controls to compliance certifications — we protect your most sensitive documents with the same rigor you'd expect from the world's top financial institutions.

Compliance Certifications

Our compliance posture is maintained through continuous monitoring, annual third-party audits, and dedicated security operations.

SOC 2 Type II

Independently audited by a certified CPA firm. Our controls for security, availability, processing integrity, confidentiality, and privacy are verified annually.

Learn More →

GDPR Compliant

Full compliance with EU General Data Protection Regulation. Right to access, rectify, erase, and port your data. DPA available on request.

Learn More →

HIPAA Ready

Administrative, physical, and technical safeguards for Protected Health Information (PHI). BAA available for healthcare organizations.

Learn More →

ISO 27001

Information security management system certified. Comprehensive risk management and security controls across all operations.

Learn More →

Zero-Trust Security Architecture

We assume every request is potentially hostile — from inside and outside the network. Every access, every action, every API call is authenticated, authorized, and logged.

Layer 1Identity & Access
SSO (SAML/OKTA)
Multi-Factor Auth
RBAC (6-tier)
Session Management
Layer 2Data Protection
TLS 1.3 in transit
AES-256 at rest
Encrypted backups
Workspace isolation
Layer 3Monitoring & Response
Real-time detection
DLP enforcement
24/7 monitoring
Automated response

Security Features by Category

Access Control

  • Single Sign-On (SAML 2.0, OKTA, Auth0)
  • Multi-Factor Authentication (TOTP, SMS)
  • Role-Based Access Control (6-tier: Owner → Viewer)
  • Department and team-level permission inheritance
  • Document-level and folder-level access controls
  • Guest access with time-limited permissions + auto expiry
  • IP allowlisting (Supreme)
  • Session management with device tracking
  • Session revocation capability

Data Security

  • TLS 1.3 encryption for all data in transit
  • AES-256 encryption for all data at rest
  • Workspace-level data isolation (no cross-contamination)
  • Encrypted backup storage with point-in-time recovery
  • Secure file deletion (NIST 800-88 compliant)
  • API key encryption (AES-256)
  • Field-level encryption for sensitive metadata

Compliance & Audit

  • Comprehensive audit trail for every user action
  • Immutable audit logs (tamper-evident)
  • GDPR data export and deletion workflows
  • HIPAA Business Associate Agreement (BAA) available
  • Data residency options (US, EU, custom — Supreme)
  • DLP policy enforcement
  • Compliance reporting dashboards

Infrastructure

  • Multi-region cloud deployment
  • 99.9% uptime SLA (custom SLAs available on Supreme)
  • Auto-failover and disaster recovery
  • Regular penetration testing by third-party firm
  • Vulnerability disclosure program
  • Security patches within 24 hours of critical CVEs

What Happens to Your Documents

Your Data Is Yours

We never train any AI model on your documents. Your content is never used to improve our systems without explicit written consent.

Retention & Deletion

Documents are retained per your configured retention policy. Deletion requests are executed within 72 hours, with certificate of deletion available on request (Supreme).

No Third-Party Data Sharing

We do not sell, share, or transfer your document data to any third party for any commercial purpose.

On-Premise & Private Cloud Options

For organizations that cannot use shared cloud infrastructure — government agencies, defense contractors, highly regulated financial institutions — Inkscribe AI Enterprise Supreme offers full on-premise and private cloud deployment with the same feature set as our cloud offering.

Default

Cloud (SaaS)

  • Multi-region deployment
  • Auto-scaling infrastructure
  • Fully managed by Inkscribe
  • 99.9% uptime SLA
  • Available on all plans
Supreme

Private Cloud

  • Deploy in your AWS, Azure, or GCP tenancy
  • Your data never leaves your cloud account
  • Managed updates and patching
  • Custom network configuration
  • Dedicated support team
Custom Pricing

On-Premise

  • Full deployment behind your firewall
  • Air-gapped options available
  • Complete data sovereignty
  • Hardware security module (HSM) support
  • Dedicated implementation team

Trust Center Resources

Documentation your security and procurement teams need.

Security Whitepaper

Comprehensive overview of our security architecture, practices, and certifications.

Download PDF

SOC 2 Report

Full SOC 2 Type II audit report from our certified CPA firm.

Available under NDA

GDPR Data Processing Agreement

Standard DPA for organizations processing EU citizen data.

Download DPA

Penetration Test Summary

Executive summary of our latest third-party penetration test.

Available under NDA

Security Questions? Talk to Our Team.

Our security architects are available for pre-sales security reviews. We'll walk through your specific requirements, answer detailed technical questions, and provide any documentation your procurement team needs.

Talk to Enterprise Sales