Deployment options & data control

Pick the model that fits your risk posture:

In all models we process rule text + schema metadata + account data (no raw logs). Encryption in transit/at rest, SSO/RBAC, audit logs, and static validation apply. Region locking and egress policies are supported; cross‑border transfers (if any) follow our DPA and applicable transfer tools.