Enterprise-grade security for every customer
LaserBI is built with a defense-in-depth approach: encrypted by default, least-privilege access, and strict tenant isolation. We meet teams where they are with SSO, audit logging, and a transparent compliance roadmap.
- π Encryption β TLS 1.2+ in transit, AES-256 at rest
- π₯ Access controls β SSO, MFA, RBAC, SCIM (Roadmap)
- π§Ύ Auditability β Admin audit logs & export
- π Data residency β US default; EU options (Roadmap)
- π¦ Backups & continuity β Point-in-time restore; documented RPO/RTO
Trusted controls and a transparent compliance roadmap
Defense-in-depth for your data, identities, and workflows
We combine modern encryption, strong authentication, granular authorization, and strict tenant isolation. Your data is never used to train public AI models.
Lifecycle controls
| Stage | Primary controls |
|---|---|
| Ingestion | TLS 1.2+, OAuth/scoped API keys, optional IP allow-listing |
| Processing | Ephemeral compute; least-privilege roles; secrets in KMS; change-managed pipelines |
| Storage | AES-256 at rest; per-tenant isolation; encrypted backups |
| Access | SSO (SAML/OIDC); MFA via IdP; RBAC; admin audit logs & export |
| Retention & Deletion | Configurable retention policies; hard deletes upon contract termination |
Annual third-party penetration tests with executive summary available under NDA.
Aligned with leading frameworks and built for continuity
LaserBI adheres to global privacy and security standards while maintaining transparent operational practicesβbackups, monitoring, and annual assessments included.
Compliance & Privacy
- GDPR & CCPA controls with standard DPA available on request.
- SOC 2 Type II Assessment in progress
- ISO/IEC 27001 Gap analysis
- Sub-processors reviewed before onboarding; list available upon request.
- Annual 3rd-party penetration tests; executive summary available under NDA.
Reliability & Operations
| Area | Controls |
|---|---|
| Backups | Encrypted, automated daily backups; point-in-time restore capability |
| Continuity | Defined RPO/RTO targets; multi-AZ resilience with provider redundancy |
| Monitoring | Continuous uptime and anomaly monitoring; alerting to on-call |
| Development | Secure SDLC; code review; dependency scanning; secrets via KMS |
| Incident Response | Documented playbooks; on-call rotations; customer notifications per contract |
Security questions, answered
Do you use customer data to train AI models?
Where is my data stored?
Do you support SSO or SCIM?
Do you perform security assessments?
Can LaserBI be hosted privately?
Can we sign a DPA or get the sub-processor list?
Talk to our security team
Need a DPA, sub-processor list, or security questionnaire? Our team is ready to assist.
Security details subject to change as we strengthen our controls.