Enterprise · Security

The Zedly Security Ladder

Pick your privacy level. Same product, matched to your risk tolerance — from browser sessions to fully air-gapped.

Five Levels of Data Protection

Each rung adds controls. Pick the level that matches your compliance and risk posture.

1
Start

Browser Session

Upload documents, analyze them, and clear your desk when you're done. Short-lived processing with no persistent storage required. The fastest way to get value with the lowest friction.

Clear Desk Short-lived No storage required
Best for: quick internal docs, low-risk workflows
2
Team

Encrypted Vault + Access Controls

Files stored encrypted in your Vault. Role-based access control keeps teams and matters separated. Retention policies let you control what stays and what gets deleted.

Encrypted Vault RBAC Retention controls
Best for: teams that need history and repeat analysis
3
VPC

Private Cloud / VPC

A dedicated Zedly environment running inside your own AWS or Azure VPC. Network isolation via private endpoints means data never crosses the public internet.

Your VPC PrivateLink Customer-managed keys
Best for: regulated companies who can't share infrastructure
4
Air-Gap

Air-Gapped / Offline

Runs entirely in your network with zero internet dependency. Models and updates delivered via secure offline media. No data leaves the environment — ever.

Zero internet Offline delivery SCIF-ready
Best for: Gov/Defense and “no data leaves” policies
5
Enterprise

Governance

The enterprise compliance layer. Audit logs, retention policies, key management (KMS/BYOK), and SSO/SAML. Optional customer-managed model keys and model routing for full control over inference.

Audit logs SSO / SAML KMS / BYOK
Best for: procurement and compliance reviews
“Pick your privacy level.”

Most AI vendors lead with compliance badges: "HIPAA compliant" or "SOC 2 certified". We lead with a question: what level of data control does your organization actually need?

Same product value at every rung. The difference is how much control you want over where your data lives, who can access it, and what leaves your environment.

We can be secure enough for your policy. Here's exactly what that means technically.

Which Rung Fits Your Team?

Tell us your compliance requirements and risk tolerance. We'll recommend the right level and walk you through exactly what it means technically.

Talk to Sales