Security

Security by deployment.

Enterprise controls for native document generation workflows.

Data flow
No training on customer data
Customer systemsCRM · ERP · HRIS
OrigraphRender pipeline
Native artifactPPTX · DOCX · XLSX · PDF
Security principles

Designed around what enterprise security teams ask first.

No model training

Customer data is not used for training.

Encryption

Encryption in transit and at rest.

Private deployment

Run Origraph where your data lives.

HostedVPCPrivate cloudOn-prem

Tenant isolation

Workspace boundaries and isolation.

Data flow

Customer data in. Native artifact out.

CRM
ERP
HRIS
Agents
Origraph
Template compiler
Native output
Guarantee
Editable output
Guarantee
Deterministic rendering
Guarantee
No screenshots
Guarantee
No HTML export
Deployment modes

Run Origraph where your data lives.

01

Hosted API

Managed environment.

02

VPC

Private networking.

03

Private cloud

Customer cloud.

04

On-prem

Air-gapped support.

Access control

Controls scoped to your team.

Workspace isolation
API keys
RBAC
Audit logs
Template governance
Scoped access
Enterprise readiness

Ready for procurement.

We support standard enterprise diligence and contracting workflows.

Security reviews
DPA support
Private deployment
Architecture review
Template governance
Audit support
FAQ

Frequently asked.

Security

Need security review materials?