security
Security by architecture,
not by policy.
Your data never leaves your infrastructure. Here's how.
architecture
Built different from the ground up
Isolated instances
Every customer gets their own machine. Not a container on shared infra. A real, isolated server.
Zero data transit
Your data stays on your instance. Chain configs, agent outputs, run logs — all local.
Direct API calls
LLM API keys go straight from your instance to the provider. No proxy, no middleman.
Full data sovereignty
You choose the region. You own the data. Export anytime. Delete and walk away clean.
Encryption & secrets
Your keys and credentials are the most sensitive data in the system. We treat them that way.
Access control
Fine-grained permissions. Right people, right things.
compliance
Designed for compliance
Data stays in your chosen region, full export and deletion on request.
Audit trail on your machine, no third-party data access.
Isolated infrastructure, encrypted at rest. BAA available on Enterprise.
Specific certifications are on our roadmap. Have requirements? security@mentiko.com
transparency
What we don't do
Not marketing promises. Architectural constraints.
Questions about
security?
We'll answer anything about how your data is handled.
security@mentiko.com30 seconds. No credit card.