Security is nothing without trust. Here is how we remain accountable to you.
Transparency is not just a value at AncileBase; it is a technical requirement. When you trust us to protect your infrastructure, you deserve complete visibility into how we operate, how we handle your data, and where our boundaries lie.
While our core AI models are proprietary, our agent communication protocols and monitoring hooks are designed to be auditable.
We operate on a "Privacy by Design" principle. We believe that we shouldn't have access to your data unless it's absolutely necessary for protection.
AncileBase focuses on metadata and behavioral patterns. We do not store sensitive request bodies or PII unless specifically configured for deep packet inspection. Most of our processing happens locally within your infrastructure via our agents.
All telemetry data sent from your agents to the AncileBase control plane is encrypted in transit using TLS 1.3 and at rest using AES-256-GCM. We support Bring Your Own Key (BYOK) for enterprise customers.
We commit to notifying our customers within 4 hours of any suspected breach or unauthorized access to our internal systems. Our security team maintains a "no-black-box" policy—if an agent blocks a request, we provide the exact reasoning and the data points that triggered the decision.
As an AI-native company, we are committed to the responsible use of machine learning. We do not use customer traffic data to train models that are shared across different organizations. Your threat models are yours alone.