Data & Trust
Your data is your most important asset: we keep it safe
Cloud
Deploy Axiom securely in the cloud
-
Encryption: data is encrypted in transit and at rest.
-
Trusted networks: restrict Axiom access to your corporate IP range.
-
Passwordless login: reduces credential theft and phishing risks.
On-prem
Self manage your Axiom deployment
-
Single tenancy: customize security controls to fit your organization.
-
Complete application log visibility: maintain complete audit trails for compliance requirements and audit processes.
-
Auto-scale capacity: get results on your timelines by growing or shrinking compute based on your needs.
Shared-Nothing Data Architecture
Your data at rest is stored on dedicated, individually-permissioned containers, providing robust isolation and maintaining clear security boundaries between customer environments.
Zero AI Training on Customer Data
Axiom maintains a strict policy against using customer data to train or enhance our AI/ML models, ensuring your data remains yours.
Zero-Retention Data Handling
When you're done, we're done - Axiom thoroughly removes all customer data, leaving no residual footprint in our systems.
Enterprise-Grade Encryption
We implement strong encryption for data at rest and in transit. Our systematic key rotation policies align with industry best practices to maintain continuous protection.
SOC 2 Type 2 Implementation
Our commitment to security excellence continues as we progress through SOC 2 implementation, with Type 2 audit completion targeted for 2025.
Assured Business Continuity
Axiom maintains geographically-dispersed redundant data backups, supported by a comprehensive Disaster Recovery plan that's available for your review upon request.
Security Measures
All customer data at rest is protected by 256-bit AES-GCM encryption, while all data in transit is secured using TLS 1.2 or higher.
All third-party processors are covered by formal Data Processing Agreements. A list of third-party processors is available.
Third-party processor authentication tokens are short-lived and narrowly scoped to prevent leaks and privilege escalation.
All customer data access is logged, and all logs are protected by user access control.
All access to Axiom systems is limited by the principle of least privilege and managed via IAM tooling.