Enterprise security, engineered in
Fortress Pipeline: 8 stages, 9 AI guards, encrypted data, physically isolated tenants. Security engineered into the Agent OS, not bolted on.
Multi-layer AI security guards · OWASP Top 10 defenses · HITL takeover
AES-256-GCM authenticated encryption · encrypted search · per-group cryptographic keys
Dedicated VMs · separated DB tables · encrypted container images · signed supply chain
Security across infrastructure, data, and agents
Physical tenant isolation
Dedicated VMs and separated database tables per tenant. Not row-level: infrastructure-boundary isolation.
Encrypted container images
Docker images encrypted layer-by-layer with per-customer keys. Supply chain signed, tamper-evident.
AES-256-GCM PII encryption
Sensitive fields are encrypted at the application layer with authenticated GCM mode. Keys rotated via KeyVault.
Search-while-encrypted index
Search encrypted fields by exact match without ever decrypting. Industry-standard secure indexing.
Per-group dedicated encryption keys
Independent cryptographic keys per group; compromise of one group cannot expose others. Encrypted key backup.
Multi-layer AI security guards
Prompt injection, knowledge poisoning, and PII leakage defended at platform level: aligned with OWASP Top 10 for LLM.
Knowledge access, layered by agent tier
Every agent is classified by access tier: and knowledge reach is scoped accordingly. A public concierge cannot see internal group data; a personal assistant cannot see other users' private notes.
Private · Assistant
Personal scopeAccess only to the individual user's private knowledge, notes, and conversation history. Isolated from group and public knowledge unless explicitly granted.
Export · Group
Group scopeAccess to shared group knowledge (team documents, collective memory). Private user data remains invisible. Bound to the group's dedicated encryption key.
Public · Concierge
Public scopeCustomer-facing agents restricted to sanitized public knowledge. No internal data, no user history: safe for signage, websites, and external channels.
Defenses mapped to OWASP for AI and Agent threats
Every AICLUDE deployment ships with platform-level defenses aligned with OWASP Top 10 for LLM Applications and the emerging OWASP for AI Agent threat catalog: not bolted on, but built into the pipeline.
Every Skill and MCP server, scanned before you install
AICLUDE VS continuously pre-scans the global Skill and MCP ecosystem: thousands of packages from npm, GitHub, Smithery, and more. 7 parallel scan engines analyze each package across 10 AI-specific threat categories, so only vetted, safe Skills and MCP servers reach your agents.
- 7 parallel scan engines (SAST · SCA · Tool Analyzer · DAST · Permission · Behavior · Malware)
- 10 AI threat categories (Prompt Injection · Tool Poisoning · Command Injection · …)
- Risk Score 0–100 with 5 severity levels · SBOM auto-generated
- Scan Search · Risk Reports · Connected Agents · MCP / Skill integration
Same Docker images. Your choice of infrastructure.
Cloud: physical tenant VMs
Each Cloud tier from Pro up runs on a dedicated tenant VM. Starter uses a shared tenant pool with per-tenant resource quotas.
Self-hosted: encrypted binaries
Encrypted container images delivered to your infrastructure via private registry. License server check-in with 7-day offline grace.
Air-gapped: Enterprise
Full offline / air-gapped deployment available for Self-hosted Enterprise. Model ONNX packages + encrypted image bundle delivered physically.
Ready to see it in action?
Open AICLUDE VS to audit your agents, or contact us for a security deep-dive.