The most secure
AI platform for firms
The most secure
AI platform for firms

Why we take security
very seriously
Why we take security very seriously
At Trove AI, client data security is paramount and deeply embedded in our operational ethos. We adopt a proactive and multi-layered approach, prioritizing the confidentiality, integrity, and availability of all client information.
Our commitment extends to private cloud deployments, SOC 2 Type II compliance, implementing stringent access controls, and regular security audits to safeguard against threats.


Private Cloud Deployment
Deployed in your cloud environment, meaning your data lives on your systems.
Read more



SOC 2 Type II
Demonstrating our commitment to the highest standards of data security.
Read more
Private Cloud Deployment
Deployed in your cloud environment, meaning your data lives on your systems.
Read more



SOC 2 Type II
Demonstrating our commitment to the highest standards of data security.
Read more
Private Cloud Deployment
Deployed in your cloud environment, meaning your data lives on your systems.
Read more



SOC 2 Type II
Demonstrating our commitment to the highest standards of data security.
Read more
Built for enterprise

Full Data Encryption
Encryption everywhere: TLS 1.2+ in transit, AES-256 at rest.
Read more

Full Data Encryption
Encryption everywhere: TLS 1.2+ in transit, AES-256 at rest.
Read more

Full Data Encryption
Encryption everywhere: TLS 1.2+ in transit, AES-256 at rest.
Read more

Privacy Guaranteed
Your data remains exclusively within control and is never used to benefit others.
Read more
Our Expertise
We know secure enterprise AI applications better than anyone.
Read more

Privacy Guaranteed
Your data remains exclusively within control and is never used to benefit others.
Read more
Our Expertise
We know secure enterprise AI applications better than anyone.
Read more

Privacy Guaranteed
Your data remains exclusively within control and is never used to benefit others.
Read more
Our Expertise
We know secure enterprise AI applications better than anyone.
Read more
Your Private Cloud, Perfected
Deployed in your cloud environment, meaning your data lives on your systems.
Read more
Your Private Cloud, Perfected
Deployed in your cloud environment, meaning your data lives on your systems.
Read more
SOC 2 Type II
Demonstrating our commitment to the highest standards of data security.
Read more
SOC 2 Type II
Demonstrating our commitment to the highest standards of data security.
Read more
Full data encryption
We don’t retain your data and never train models on your data.
Read more
Full data encryption
We don’t retain your data and never train models on your data.
Read more


Privacy Guaranteed
Our commitment is that your data remains exclusively within your control.
Read more
Privacy Guaranteed
Our commitment is that your data remains exclusively within your control.
Read more
Enterprise Security
Industry standard security and compliance.
Read more
Enterprise Security
Industry standard security and compliance.
Read more


Frequently Asked Questions
Q
Can you give an overview of additional security measures you take?
A
We are SOC 2 Type II certified and are continually undergoing security audits. See our SOC 2 Security Portal.
Our security practices include penetration testing & vulnerability scans by third parties, end-to-end data encryption, data backups, firewalls & malware detection software, monitoring & alerting to ensure product reliability, MFA on all accounts, required security training & background checks, access control reviews, and detailed security policies.
Q
Can you give an overview of additional security measures you take?
A
We are SOC 2 Type II certified and are continually undergoing security audits. See our SOC 2 Security Portal.
Our security practices include penetration testing & vulnerability scans by third parties, end-to-end data encryption, data backups, firewalls & malware detection software, monitoring & alerting to ensure product reliability, MFA on all accounts, required security training & background checks, access control reviews, and detailed security policies.
Q
Can you give an overview of additional security measures you take?
A
We are SOC 2 Type II certified and are continually undergoing security audits. See our SOC 2 Security Portal.
Our security practices include penetration testing & vulnerability scans by third parties, end-to-end data encryption, data backups, firewalls & malware detection software, monitoring & alerting to ensure product reliability, MFA on all accounts, required security training & background checks, access control reviews, and detailed security policies.
Q
Can you give an overview of additional security measures you take?
A
We are SOC 2 Type II certified and are continually undergoing security audits. See our SOC 2 Security Portal.
Our security practices include penetration testing & vulnerability scans by third parties, end-to-end data encryption, data backups, firewalls & malware detection software, monitoring & alerting to ensure product reliability, MFA on all accounts, required security training & background checks, access control reviews, and detailed security policies.
Q
Can you share more details on your deployment model?
A
Our cloud-prem deployment model is an elevated security measure we take to ensure that your data never leaves your environment, apart from OpenAI API calls. Trove is deployed on a virtual private cloud on either Microsoft Azure or Google Cloud Platform within a resource group / project set up and owned by you as the customer. For each of your apps, Trove will need API keys scoped to read-only. These API keys are securely stored within the customer's cloud.
All data is stored within relational databases and blob storage, managed within the customer's project. Data is encrypted in transit and at rest and regularly backed up. Users authenticate via existing SSO. Trove will have service accounts with code push access to the customer's project. Service account keys are securely stored in a customer's project. Only code from managed releases can be deployed. Trove uses a change management system to control and track all code and system changes. Logs may be used by Trove employees for error alerting and debugging, but no sensitive data will be logged.
Q
Can you share more details on your deployment model?
A
Our cloud-prem deployment model is an elevated security measure we take to ensure that your data never leaves your environment, apart from OpenAI API calls. Trove is deployed on a virtual private cloud on either Microsoft Azure or Google Cloud Platform within a resource group / project set up and owned by you as the customer. For each of your apps, Trove will need API keys scoped to read-only. These API keys are securely stored within the customer's cloud.
All data is stored within relational databases and blob storage, managed within the customer's project. Data is encrypted in transit and at rest and regularly backed up. Users authenticate via existing SSO. Trove will have service accounts with code push access to the customer's project. Service account keys are securely stored in a customer's project. Only code from managed releases can be deployed. Trove uses a change management system to control and track all code and system changes. Logs may be used by Trove employees for error alerting and debugging, but no sensitive data will be logged.
Q
Can you share more details on your deployment model?
A
Our cloud-prem deployment model is an elevated security measure we take to ensure that your data never leaves your environment, apart from OpenAI API calls. Trove is deployed on a virtual private cloud on either Microsoft Azure or Google Cloud Platform within a resource group / project set up and owned by you as the customer. For each of your apps, Trove will need API keys scoped to read-only. These API keys are securely stored within the customer's cloud.
All data is stored within relational databases and blob storage, managed within the customer's project. Data is encrypted in transit and at rest and regularly backed up. Users authenticate via existing SSO. Trove will have service accounts with code push access to the customer's project. Service account keys are securely stored in a customer's project. Only code from managed releases can be deployed. Trove uses a change management system to control and track all code and system changes. Logs may be used by Trove employees for error alerting and debugging, but no sensitive data will be logged.
Q
Can you share more details on your deployment model?
A
Our cloud-prem deployment model is an elevated security measure we take to ensure that your data never leaves your environment, apart from OpenAI API calls. Trove is deployed on a virtual private cloud on either Microsoft Azure or Google Cloud Platform within a resource group / project set up and owned by you as the customer. For each of your apps, Trove will need API keys scoped to read-only. These API keys are securely stored within the customer's cloud.
All data is stored within relational databases and blob storage, managed within the customer's project. Data is encrypted in transit and at rest and regularly backed up. Users authenticate via existing SSO. Trove will have service accounts with code push access to the customer's project. Service account keys are securely stored in a customer's project. Only code from managed releases can be deployed. Trove uses a change management system to control and track all code and system changes. Logs may be used by Trove employees for error alerting and debugging, but no sensitive data will be logged.
Q
How are permissions handled?
A
Users are only able to see materials they already have access to in underlying apps.
We also work with you to identify the subset of folders that you want the Trove app to index. Anything outside of these folders will never enter the Trove app.
Q
How are permissions handled?
A
Users are only able to see materials they already have access to in underlying apps.
We also work with you to identify the subset of folders that you want the Trove app to index. Anything outside of these folders will never enter the Trove app.
Q
How are permissions handled?
A
Users are only able to see materials they already have access to in underlying apps.
We also work with you to identify the subset of folders that you want the Trove app to index. Anything outside of these folders will never enter the Trove app.
Q
How are permissions handled?
A
Users are only able to see materials they already have access to in underlying apps.
We also work with you to identify the subset of folders that you want the Trove app to index. Anything outside of these folders will never enter the Trove app.
Q
Do you require that we integrate with all our data?
A
No – we can meet our partners where they are at. We have the flexibility to integrate into subsets of data, whether that's certain folders within an app or certain integrations. However, performance is only as good as the underlying data, so the more relevant content we can index, the better the results will be.
Q
Do you require that we integrate with all our data?
A
No – we can meet our partners where they are at. We have the flexibility to integrate into subsets of data, whether that's certain folders within an app or certain integrations. However, performance is only as good as the underlying data, so the more relevant content we can index, the better the results will be.
Q
Do you require that we integrate with all our data?
A
No – we can meet our partners where they are at. We have the flexibility to integrate into subsets of data, whether that's certain folders within an app or certain integrations. However, performance is only as good as the underlying data, so the more relevant content we can index, the better the results will be.
Q
Do you require that we integrate with all our data?
A
No – we can meet our partners where they are at. We have the flexibility to integrate into subsets of data, whether that's certain folders within an app or certain integrations. However, performance is only as good as the underlying data, so the more relevant content we can index, the better the results will be.
Q
What if Trove as a company gets hacked?
A
In the unlikely event that our systems at Trove get compromised, an attacker would still be unable to view / access any of your firm's files. That is because your firm owns and manages this Trove application, not us – and we at Trove do not have access to your firm's underlying files.
Q
What if Trove as a company gets hacked?
A
In the unlikely event that our systems at Trove get compromised, an attacker would still be unable to view / access any of your firm's files. That is because your firm owns and manages this Trove application, not us – and we at Trove do not have access to your firm's underlying files.
Q
What if Trove as a company gets hacked?
A
In the unlikely event that our systems at Trove get compromised, an attacker would still be unable to view / access any of your firm's files. That is because your firm owns and manages this Trove application, not us – and we at Trove do not have access to your firm's underlying files.
Q
What if Trove as a company gets hacked?
A
In the unlikely event that our systems at Trove get compromised, an attacker would still be unable to view / access any of your firm's files. That is because your firm owns and manages this Trove application, not us – and we at Trove do not have access to your firm's underlying files.