Security

Security at PurrAgent

We build security into everything we do. Your data protection is not a feature — it's our foundation.

End-to-End Encryption

All data in transit is encrypted with TLS 1.3. Data at rest is encrypted with AES-256. Your communications with AI agents are always protected.

Self-Hosted Option

Deploy PurrAgent entirely on your own infrastructure. Your data never leaves your servers. Full control over your security posture.

Zero Third-Party Access

PurrAgent does not share your data with third parties. On self-hosted deployments, even PurrAgent has no access to your data or AI interactions.

SOC 2 Compliant

Our cloud infrastructure follows SOC 2 Type II controls for security, availability, and confidentiality. Regular third-party audits ensure compliance.

Automatic Backups

Cloud deployments include automated daily backups with point-in-time recovery. Self-hosted customers can configure backup policies to their requirements.

Audit Logging

Complete audit trail of all actions, agent activities, and system access. Exportable logs for compliance and security review.

Security Practices

All code reviewed and tested before deployment
Regular penetration testing by independent firms
Bug bounty program for responsible disclosure
Role-based access control (RBAC) throughout
Multi-factor authentication (MFA) supported
Automated vulnerability scanning on all builds
Incident response plan with 4-hour SLA
Employee security training and background checks

Report a Vulnerability

Found a security issue? We take all reports seriously. Contact our security team at [email protected]