Secured by design
Unleash was founded by cyber-security experts. Data protection is a core value for our company.
Book a demo
Leading enterprises trust us with their data

Meets the highest industry standards

Soc 2 Type II Certified

The most comprehensive certification ensures that our system is designed to keep our customers’ sensitive data secure.

Secure data encryption

All customer data is encrypted at rest with FIPS 140-2 validated crypto module utilizing AES 256 bit encryption. All data in transit is encrypted using TLS 1.2+.

GDPR compliant

Customers’ personal information is maintained and secured in accordance with the EU's General Data Protection Regulation (GDPR).

Robust measures to protect your data

Deploy Unleash in the environment that suits you best

Deploy in a dedicated server or multi-tenant option within our cloud, or deploy it within your cloud infrastructure.

Zero data retention by third-party LLMs

Your data is never used to train, nor retained by, third-party LLMs.

Users retain access based on their existing permissions

Unleash's data governance ensures users only have access in accordance with their existing permissions.

Securely log in to Unleash's platform

Unleash connects to your existing identity provider such as Azure Active Directory, Okta, or G-suite.

Minimal Data Retention

Unleash retains only the essential information for the shortest time necessary.

Enterprise grade security are in place

Unleash supports SAML SSO, SCIM and SEIM services.

Indexing controls

You choose the data sources you wish Unleash to access. Define the limits up to folder level granularity.

Encryption of all data

All data is encrypted at rest using AES 256. All data is encrypted in transit using TLS 1.2+. Controls are in place to limit data exfiltration risks.

FAQ

Does Unleash train its model on our data?
No, the technology used in enterprise search solutions does not involve model training. Instead, it utilizes Retrieval Augmented Generation (RAG). This means that Unleash harnesses the power of AI, such as GPT models, to locate information within a specific database. Importantly, this process does not involve training on client data.
How does Unleash avoid hallucinations in answers without fine-tuning models on our data?
Unleash uses multiple techniques to provide answers, including: Ranking - the probability of answers based on multiple signals such as role, recency, data source and more. Prompt engineering - Explaining to the LLM what it needs to do to answer the question. User feedback - Incorporating negative and positive feedback on the answers.
Can our data be accessed by other clients of Unleash?
No. Each customer’s data is saved in an isolated index and encrypted. The data can be hosted in the EU territory upon request. The answers generated for each customer are based on their unique data set, meaning you can’t get answers from sources external to your company’s knowledge bases.
Is there any effort we need to make in terms of IT to onboard Unleash?
The required effort is minimal. It involves IT personnel with administrative permissions assisting in defining teams and establishing connections. From that point forward, Unleash will utilize advanced technology to leverage existing permissions and privacy controls by connecting to your identity provider, such as Azure Active Directory, Okta, or Firebase. Additionally, we support resource-level permissions on platforms like Microsoft, Google, Salesforce, and AWS, which means that permission controls are preserved as they are.
How do you ensure that employees do not have unauthorized access to organizational data?
Unleash offers several methods to verify and mitigate risks. These include enforcing existing permissions and privacy controls, as well as utilizing your existing identity provider, such as Azure Active Directory, Okta, or Firebase. Additionally, Unleash supports resource-level permissions on platforms like Sharepoint, Google Drive, Salesforce, Jira, Confluence and more, ensuring that the permission controls remain unchanged.
Where is my data stored?
Unleash’s data centers are hosted in top-tier cloud service providers, Microsoft Azure and Amazon AWS. All servers are protected inside a private network, beyond firewalls and VPN. Access is limited to key personal only who have physical access to the office.

See all you can accomplish with Unleash

Start leveraging AI to save time on your searches
Book a demo

Get in touch

Name
Work Email
Your message

Thank You!

We got your message and will get back to you soon!
Oops! Something went wrong while submitting the form.