Security
Security by deployment.
Enterprise controls for native document generation workflows.
Data flow
No training on customer data
Customer systemsCRM · ERP · HRIS
OrigraphRender pipeline
Native artifactPPTX · DOCX · XLSX · PDF
Security principles
Designed around what enterprise security teams ask first.
No model training
Customer data is not used for training.
Encryption
Encryption in transit and at rest.
Private deployment
Run Origraph where your data lives.
HostedVPCPrivate cloudOn-prem
Tenant isolation
Workspace boundaries and isolation.
Data flow
Customer data in. Native artifact out.
CRM
ERP
HRIS
Agents
Origraph
Template compiler
Native output
Guarantee
Editable output
Guarantee
Deterministic rendering
Guarantee
No screenshots
Guarantee
No HTML export
Deployment modes
Run Origraph where your data lives.
01
Hosted API
Managed environment.
02
VPC
Private networking.
03
Private cloud
Customer cloud.
04
On-prem
Air-gapped support.
Access control
Controls scoped to your team.
Workspace isolation
API keys
RBAC
Audit logs
Template governance
Scoped access
Enterprise readiness
Ready for procurement.
We support standard enterprise diligence and contracting workflows.
Security reviews
DPA support
Private deployment
Architecture review
Template governance
Audit support
FAQ
Frequently asked.
Trust center