Data & Trust

Your data is your most important asset: we keep it safe

Cloud

Deploy Axiom securely in the cloud

  • Encryption: data is encrypted in transit and at rest.

  • Trusted networks: restrict Axiom access to your corporate IP range.

  • Passwordless login: reduces credential theft and phishing risks.

On-prem

Self manage your Axiom deployment

  • Single tenancy: customize security controls to fit your organization.

  • Complete application log visibility: maintain complete audit trails for compliance requirements and audit processes.

  • Auto-scale capacity: get results on your timelines by growing or shrinking compute based on your needs.

Shared-Nothing Data Architecture

Your data at rest is stored on dedicated, individually-permissioned containers, providing robust isolation and maintaining clear security boundaries between customer environments.

Zero AI Training on Customer Data

Axiom maintains a strict policy against using customer data to train or enhance our AI/ML models, ensuring your data remains yours.

Zero-Retention Data Handling

When you're done, we're done - Axiom thoroughly removes all customer data, leaving no residual footprint in our systems.

Enterprise-Grade Encryption

We implement strong encryption for data at rest and in transit. Our systematic key rotation policies align with industry best practices to maintain continuous protection.

SOC 2 Type 2 Implementation

Our commitment to security excellence continues as we progress through SOC 2 implementation, with Type 2 audit completion targeted for 2025.

Assured Business Continuity

Axiom maintains geographically-dispersed redundant data backups, supported by a comprehensive Disaster Recovery plan that's available for your review upon request.

Security Measures

All customer data at rest is protected by 256-bit AES-GCM encryption, while all data in transit is secured using TLS 1.2 or higher.

All third-party processors are covered by formal Data Processing Agreements. A list of third-party processors is available.

Third-party processor authentication tokens are short-lived and narrowly scoped to prevent leaks and privilege escalation.

All customer data access is logged, and all logs are protected by user access control.

All access to Axiom systems is limited by the principle of least privilege and managed via IAM tooling.