No raw prompt storage
We never store original prompt bodies by default. Only redacted, policy-processed records are logged under your retention configuration.
Qadar was designed for teams that need to prove AI governance to auditors, clients, and regulators. Here is how we do it.
We never store original prompt bodies by default. Only redacted, policy-processed records are logged under your retention configuration.
Data in transit uses TLS 1.3. Protected records are encrypted at rest with AES-256 and managed under tenant-scoped controls.
Tenant data and controls are logically isolated. Access boundaries are enforced at architecture level, not by convention.
Audit entries are append-only with per-request policy history, enabling consistent evidence for internal review, client due diligence, and regulatory checks.
Every request flows through the gateway before reaching an AI provider. Raw prompt bodies are not stored by default.
EU data residency is available across plans. When enabled, processing and audit storage remain in EU-region infrastructure under your configured governance rules.
Raw prompt bodies are not retained by default. Retention windows and export policies are tenant-configurable.
Request EU data residencyWe are building toward the certifications that regulated teams require.
| Standard | Status | Target |
|---|---|---|
| GDPR | Aligned | Live |
| SOC 2 Type I | In progress | Q3 2026 |
| SOC 2 Type II | Planned | Q4 2026 |
| ISO 27001 | Planned | 2027 |
Need a Data Processing Agreement? Talk to the team →
All API and extension traffic is encrypted in transit using TLS 1.3.
Protected records are encrypted at rest using AES-256 controls.
Each tenant uses isolated key scope; no key material is shared across tenants.
Key rotation can be scheduled or requested under enterprise governance workflows.
Qadar inspects prompts at policy time and avoids raw prompt storage by default. Audit entries capture policy outcomes and redacted metadata under your configured retention policy.
Audit access is tenant-scoped and role-controlled in Shield Control. Access events are logged, and exports can be routed to your existing SIEM or compliance systems.
Fail behavior is policy-defined per tenant and workflow. You can enforce fail-closed for high-risk routes and controlled fail-open for lower-risk workflows where continuity is required.
Current deployments are managed cloud. Enterprise teams can scope dedicated environment and residency controls during security review.
Keys are tenant-scoped, logically isolated, and rotated on schedule. Key material is never shared across tenants or exposed in customer-facing workflows.
Qadar enforces TLS 1.3 in transit and AES-256 for protected data at rest, with tenant-scoped key management and documented rotation procedures.
A product and security specialist will reply within one business day.