The most secure

AI platform for firms

The most secure

AI platform for firms

Metallic cube

Why we take security

very seriously

Why we take security very seriously

At Trove AI, client data security is paramount and deeply embedded in our operational ethos. We adopt a proactive and multi-layered approach, prioritizing the confidentiality, integrity, and availability of all client information.


Our commitment extends to private cloud deployments, SOC 2 Type II compliance, implementing stringent access controls, and regular security audits to safeguard against threats.

Private Cloud Deployment

Deployed in your cloud environment, meaning your data lives on your systems.

Read more

Modern minimalist concrete building with geometric shadows under a blue sky

SOC 2 Type II

Demonstrating our commitment to the highest standards of data security.

Read more

Private Cloud Deployment

Deployed in your cloud environment, meaning your data lives on your systems.

Read more

Modern minimalist concrete building with geometric shadows under a blue sky

SOC 2 Type II

Demonstrating our commitment to the highest standards of data security.

Read more

Private Cloud Deployment

Deployed in your cloud environment, meaning your data lives on your systems.

Read more

Modern minimalist concrete building with geometric shadows under a blue sky

SOC 2 Type II

Demonstrating our commitment to the highest standards of data security.

Read more

Built for enterprise

Abstract 3D rendering of stacked metallic cubes representing secure data blocks

Full Data Encryption

Encryption everywhere: TLS 1.2+ in transit, AES-256 at rest.

Read more

Abstract 3D rendering of stacked metallic cubes representing secure data blocks

Full Data Encryption

Encryption everywhere: TLS 1.2+ in transit, AES-256 at rest.

Read more

Abstract 3D rendering of stacked metallic cubes representing secure data blocks

Full Data Encryption

Encryption everywhere: TLS 1.2+ in transit, AES-256 at rest.

Read more

Abstract image of two blurred human figures behind frosted glass, symbolizing data privacy

Privacy Guaranteed

Your data remains exclusively within control and is never used to benefit others.

Read more

Our Expertise

We know secure enterprise AI applications better than anyone.

Read more

Abstract image of two blurred human figures behind frosted glass, symbolizing data privacy

Privacy Guaranteed

Your data remains exclusively within control and is never used to benefit others.

Read more

Our Expertise

We know secure enterprise AI applications better than anyone.

Read more

Abstract image of two blurred human figures behind frosted glass, symbolizing data privacy

Privacy Guaranteed

Your data remains exclusively within control and is never used to benefit others.

Read more

Our Expertise

We know secure enterprise AI applications better than anyone.

Read more

Your Private Cloud, Perfected

Deployed in your cloud environment, meaning your data lives on your systems.

Read more

Your Private Cloud, Perfected

Deployed in your cloud environment, meaning your data lives on your systems.

Read more

SOC 2 Type II

Demonstrating our commitment to the highest standards of data security.

Read more

SOC 2 Type II

Demonstrating our commitment to the highest standards of data security.

Read more

Full data encryption

We don’t retain your data and never train models on your data.

Read more

Full data encryption

We don’t retain your data and never train models on your data.

Read more

Privacy Guaranteed

Our commitment is that your data remains exclusively within your control.

Read more

Privacy Guaranteed

Our commitment is that your data remains exclusively within your control.

Read more

Enterprise Security

Industry standard security and compliance.

Read more

Enterprise Security

Industry standard security and compliance.

Read more

Frequently Asked Questions

Q

Can you give an overview of additional security measures you take?

A

We are SOC 2 Type II certified and are continually undergoing security audits. See our SOC 2 Security Portal.

Our security practices include penetration testing & vulnerability scans by third parties, end-to-end data encryption, data backups, firewalls & malware detection software, monitoring & alerting to ensure product reliability, MFA on all accounts, required security training & background checks, access control reviews, and detailed security policies.

Q

Can you give an overview of additional security measures you take?

A

We are SOC 2 Type II certified and are continually undergoing security audits. See our SOC 2 Security Portal.

Our security practices include penetration testing & vulnerability scans by third parties, end-to-end data encryption, data backups, firewalls & malware detection software, monitoring & alerting to ensure product reliability, MFA on all accounts, required security training & background checks, access control reviews, and detailed security policies.

Q

Can you give an overview of additional security measures you take?

A

We are SOC 2 Type II certified and are continually undergoing security audits. See our SOC 2 Security Portal.

Our security practices include penetration testing & vulnerability scans by third parties, end-to-end data encryption, data backups, firewalls & malware detection software, monitoring & alerting to ensure product reliability, MFA on all accounts, required security training & background checks, access control reviews, and detailed security policies.

Q

Can you give an overview of additional security measures you take?

A

We are SOC 2 Type II certified and are continually undergoing security audits. See our SOC 2 Security Portal.

Our security practices include penetration testing & vulnerability scans by third parties, end-to-end data encryption, data backups, firewalls & malware detection software, monitoring & alerting to ensure product reliability, MFA on all accounts, required security training & background checks, access control reviews, and detailed security policies.

Q

Can you share more details on your deployment model?

A

Our cloud-prem deployment model is an elevated security measure we take to ensure that your data never leaves your environment, apart from OpenAI API calls. Trove is deployed on a virtual private cloud on either Microsoft Azure or Google Cloud Platform within a resource group / project set up and owned by you as the customer. For each of your apps, Trove will need API keys scoped to read-only. These API keys are securely stored within the customer's cloud.

All data is stored within relational databases and blob storage, managed within the customer's project. Data is encrypted in transit and at rest and regularly backed up. Users authenticate via existing SSO. Trove will have service accounts with code push access to the customer's project. Service account keys are securely stored in a customer's project. Only code from managed releases can be deployed. Trove uses a change management system to control and track all code and system changes. Logs may be used by Trove employees for error alerting and debugging, but no sensitive data will be logged.

Q

Can you share more details on your deployment model?

A

Our cloud-prem deployment model is an elevated security measure we take to ensure that your data never leaves your environment, apart from OpenAI API calls. Trove is deployed on a virtual private cloud on either Microsoft Azure or Google Cloud Platform within a resource group / project set up and owned by you as the customer. For each of your apps, Trove will need API keys scoped to read-only. These API keys are securely stored within the customer's cloud.

All data is stored within relational databases and blob storage, managed within the customer's project. Data is encrypted in transit and at rest and regularly backed up. Users authenticate via existing SSO. Trove will have service accounts with code push access to the customer's project. Service account keys are securely stored in a customer's project. Only code from managed releases can be deployed. Trove uses a change management system to control and track all code and system changes. Logs may be used by Trove employees for error alerting and debugging, but no sensitive data will be logged.

Q

Can you share more details on your deployment model?

A

Our cloud-prem deployment model is an elevated security measure we take to ensure that your data never leaves your environment, apart from OpenAI API calls. Trove is deployed on a virtual private cloud on either Microsoft Azure or Google Cloud Platform within a resource group / project set up and owned by you as the customer. For each of your apps, Trove will need API keys scoped to read-only. These API keys are securely stored within the customer's cloud.

All data is stored within relational databases and blob storage, managed within the customer's project. Data is encrypted in transit and at rest and regularly backed up. Users authenticate via existing SSO. Trove will have service accounts with code push access to the customer's project. Service account keys are securely stored in a customer's project. Only code from managed releases can be deployed. Trove uses a change management system to control and track all code and system changes. Logs may be used by Trove employees for error alerting and debugging, but no sensitive data will be logged.

Q

Can you share more details on your deployment model?

A

Our cloud-prem deployment model is an elevated security measure we take to ensure that your data never leaves your environment, apart from OpenAI API calls. Trove is deployed on a virtual private cloud on either Microsoft Azure or Google Cloud Platform within a resource group / project set up and owned by you as the customer. For each of your apps, Trove will need API keys scoped to read-only. These API keys are securely stored within the customer's cloud.

All data is stored within relational databases and blob storage, managed within the customer's project. Data is encrypted in transit and at rest and regularly backed up. Users authenticate via existing SSO. Trove will have service accounts with code push access to the customer's project. Service account keys are securely stored in a customer's project. Only code from managed releases can be deployed. Trove uses a change management system to control and track all code and system changes. Logs may be used by Trove employees for error alerting and debugging, but no sensitive data will be logged.

Q

How are permissions handled?

A

Users are only able to see materials they already have access to in underlying apps.

We also work with you to identify the subset of folders that you want the Trove app to index. Anything outside of these folders will never enter the Trove app.

Q

How are permissions handled?

A

Users are only able to see materials they already have access to in underlying apps.

We also work with you to identify the subset of folders that you want the Trove app to index. Anything outside of these folders will never enter the Trove app.

Q

How are permissions handled?

A

Users are only able to see materials they already have access to in underlying apps.

We also work with you to identify the subset of folders that you want the Trove app to index. Anything outside of these folders will never enter the Trove app.

Q

How are permissions handled?

A

Users are only able to see materials they already have access to in underlying apps.

We also work with you to identify the subset of folders that you want the Trove app to index. Anything outside of these folders will never enter the Trove app.

Q

Do you require that we integrate with all our data?

A

No – we can meet our partners where they are at. We have the flexibility to integrate into subsets of data, whether that's certain folders within an app or certain integrations. However, performance is only as good as the underlying data, so the more relevant content we can index, the better the results will be.

Q

Do you require that we integrate with all our data?

A

No – we can meet our partners where they are at. We have the flexibility to integrate into subsets of data, whether that's certain folders within an app or certain integrations. However, performance is only as good as the underlying data, so the more relevant content we can index, the better the results will be.

Q

Do you require that we integrate with all our data?

A

No – we can meet our partners where they are at. We have the flexibility to integrate into subsets of data, whether that's certain folders within an app or certain integrations. However, performance is only as good as the underlying data, so the more relevant content we can index, the better the results will be.

Q

Do you require that we integrate with all our data?

A

No – we can meet our partners where they are at. We have the flexibility to integrate into subsets of data, whether that's certain folders within an app or certain integrations. However, performance is only as good as the underlying data, so the more relevant content we can index, the better the results will be.

Q

What if Trove as a company gets hacked?

A

In the unlikely event that our systems at Trove get compromised, an attacker would still be unable to view / access any of your firm's files. That is because your firm owns and manages this Trove application, not us – and we at Trove do not have access to your firm's underlying files.

Q

What if Trove as a company gets hacked?

A

In the unlikely event that our systems at Trove get compromised, an attacker would still be unable to view / access any of your firm's files. That is because your firm owns and manages this Trove application, not us – and we at Trove do not have access to your firm's underlying files.

Q

What if Trove as a company gets hacked?

A

In the unlikely event that our systems at Trove get compromised, an attacker would still be unable to view / access any of your firm's files. That is because your firm owns and manages this Trove application, not us – and we at Trove do not have access to your firm's underlying files.

Q

What if Trove as a company gets hacked?

A

In the unlikely event that our systems at Trove get compromised, an attacker would still be unable to view / access any of your firm's files. That is because your firm owns and manages this Trove application, not us – and we at Trove do not have access to your firm's underlying files.

Working with us

Full Enablement

We know what it takes to make you successful. We do 1:1 onboardings, group trainings, and ongoing hands-on support.

Custom Agents

We scope out your firm's most common workstreams and build custom agents to nail the execution just like you would.

Deep Partnership

We operate as an extension of your team and regularly seek input on our existing features and upcoming roadmap.

TROVE AI

AI built for
Private Equity

Mako's logo

Copyright © 2025 Trove AI. All rights reserved.

Working with us

Full Enablement

We know what it takes to make you successful. We do 1:1 onboardings, group trainings, and ongoing hands-on support.

Custom Agents

We scope out your firm's most common workstreams and build custom agents to nail the execution just like you would.

Deep Partnership

We operate as an extension of your team and regularly seek input on our existing features and upcoming roadmap.

TROVE AI

AI built for
Private Equity

Mako's logo

Copyright © 2025 Trove AI. All rights reserved.

Working with us

Full Enablement

We know what it takes to make you successful. We do 1:1 onboardings, group trainings, and ongoing hands-on support.

Custom Agents

We scope out your firm's most common workstreams and build custom agents to nail the execution just like you would.

Deep Partnership

We operate as an extension of your team and regularly seek input on our existing features and upcoming roadmap.

TROVE AI

AI built for
Private Equity

Mako's logo

Copyright © 2025 Trove AI. All rights reserved.