The Zedly Security Ladder
Pick your privacy level. Same product, matched to your risk tolerance — from browser sessions to fully air-gapped.
Five Levels of Data Protection
Each rung adds controls. Pick the level that matches your compliance and risk posture.
Browser Session
Upload documents, analyze them, and clear your desk when you're done. Short-lived processing with no persistent storage required. The fastest way to get value with the lowest friction.
Encrypted Vault + Access Controls
Files stored encrypted in your Vault. Role-based access control keeps teams and matters separated. Retention policies let you control what stays and what gets deleted.
Private Cloud / VPC
A dedicated Zedly environment running inside your own AWS or Azure VPC. Network isolation via private endpoints means data never crosses the public internet.
Air-Gapped / Offline
Runs entirely in your network with zero internet dependency. Models and updates delivered via secure offline media. No data leaves the environment — ever.
Governance
The enterprise compliance layer. Audit logs, retention policies, key management (KMS/BYOK), and SSO/SAML. Optional customer-managed model keys and model routing for full control over inference.
Most AI vendors lead with compliance badges: "HIPAA compliant" or "SOC 2 certified". We lead with a question: what level of data control does your organization actually need?
Same product value at every rung. The difference is how much control you want over where your data lives, who can access it, and what leaves your environment.
Which Rung Fits Your Team?
Tell us your compliance requirements and risk tolerance. We'll recommend the right level and walk you through exactly what it means technically.
Talk to Sales