Enterprise-grade security for every Korey interaction

Security and privacy are foundational to Korey. From infrastructure and access controls to model safety and data handling, every part of the platform is designed to protect your data and your workflows.

SOC 2 Type II compliant

Korey maintains SOC 2 Type II compliance, demonstrating that our security controls are independently audited and verified.

This includes:

  • Strong encryption for data in transit and at rest
  • Strict access controls and identity management
  • Continuous infrastructure monitoring and auditing

Private by default

Your data is always treated as private. Korey enforces strict access policies and secure storage practices to ensure that only authorized systems and personnel can access sensitive information.

Continuously tested

Security is actively maintained through regular penetration testing and vulnerability assessments. Any issues discovered are prioritized and remediated quickly to maintain a strong security posture.

Zero data retention

Korey is built with Zero Data Retention (ZDR). No data from your interactions is stored or reused. Korey operates under a ZDR agreement with Anthropic, ensuring requests and responses are not retained.

Built-in safety checks

Every interaction passes through safeguards designed to detect and prevent LLM-specific threats, including prompt injection and malicious inputs. These protections help ensure both system integrity and data security.

No training on your data

Your data remains yours. Korey does not use customer data to train models, and our AI providers do not use it for training either.

Questions about security?

Our team is happy to share more details about our architecture, policies, and compliance practices. Contact us at hello@korey.ai