Security
Security
Security
Security of our agents and products is the top priority - and we build Idemeum accordingly.
Product security
Endpoint Care
AI security
We take a security-by-design approach to protecting your data. Our team continues to make investments so you can use Idemeum with confidence.
We take a security-by-design approach to protecting your data. Our team continues to make investments so you can use Idemeum with confidence.
Security gate
Determines if the request is a legitimate support question and is safe to execute - catches ambiguity, prompt injection, or sensitive targets before any LLM call.
Security gate
Determines if the request is a legitimate support question and is safe to execute - catches ambiguity, prompt injection, or sensitive targets before any LLM call.
Security gate
Determines if the request is a legitimate support question and is safe to execute - catches ambiguity, prompt injection, or sensitive targets before any LLM call.
Plan and execute
Produces a complete plan that becomes a binding contract - LLM can not deviate from the plan regardless of its own reasoning.
Plan and execute
Produces a complete plan that becomes a binding contract - LLM can not deviate from the plan regardless of its own reasoning.
Plan and execute
Produces a complete plan that becomes a binding contract - LLM can not deviate from the plan regardless of its own reasoning.
Reasoning guard
Validates the complete plan before execution - verifies all tools are allowed for the plan, tools aggregate risk is not exceeding the defined threshold, and all tool prerequisites are met before the execution stage.
Reasoning guard
Validates the complete plan before execution - verifies all tools are allowed for the plan, tools aggregate risk is not exceeding the defined threshold, and all tool prerequisites are met before the execution stage.
Reasoning guard
Validates the complete plan before execution - verifies all tools are allowed for the plan, tools aggregate risk is not exceeding the defined threshold, and all tool prerequisites are met before the execution stage.
Access control
Administrators can define permitted tools, risk thresholds, and required diagnostic prerequisites per skill in the admin portal.
Access control
Administrators can define permitted tools, risk thresholds, and required diagnostic prerequisites per skill in the admin portal.
Access control
Administrators can define permitted tools, risk thresholds, and required diagnostic prerequisites per skill in the admin portal.
Execution guard
Enforces all tool checks at execution time and handles necessary user permission requests on the endpoint.
Execution guard
Enforces all tool checks at execution time and handles necessary user permission requests on the endpoint.
Execution guard
Enforces all tool checks at execution time and handles necessary user permission requests on the endpoint.
Deterministic tools
Every tool is implemented as deterministic TypeScript code, ensuring predictable, auditable execution with no hallucination risk.
Deterministic tools
Every tool is implemented as deterministic TypeScript code, ensuring predictable, auditable execution with no hallucination risk.
Deterministic tools
Every tool is implemented as deterministic TypeScript code, ensuring predictable, auditable execution with no hallucination risk.
Secret redaction
Every tool output is automatically sanitized for sensitive information before it reaches the LLM.
Secret redaction
Every tool output is automatically sanitized for sensitive information before it reaches the LLM.
Secret redaction
Every tool output is automatically sanitized for sensitive information before it reaches the LLM.
Chat audit trail
Every user conversation, tool run, consent, and outputs are captured in the cloud audit trail.
Chat audit trail
Every user conversation, tool run, consent, and outputs are captured in the cloud audit trail.
Chat audit trail
Every user conversation, tool run, consent, and outputs are captured in the cloud audit trail.
Product security
Endpoint Control
security
Security is the fundamental block to our application, privilege, and admin account control.
Security is the fundamental block to our application, privilege, and admin account control.
Logins with MFA
Every login is multi-factor, using the combination of biometrics and certificates.
Logins with MFA
Every login is multi-factor, using the combination of biometrics and certificates.
Logins with MFA
Every login is multi-factor, using the combination of biometrics and certificates.
FIDO2 compliant
Idemeum mobile app implements MFA based on modern FIDO2 standards.
FIDO2 compliant
Idemeum mobile app implements MFA based on modern FIDO2 standards.
FIDO2 compliant
Idemeum mobile app implements MFA based on modern FIDO2 standards.
Device recovery
When encryption keys are lost, recovery can be performed using the emergency key, or with approval by other technicians.
Device recovery
When encryption keys are lost, recovery can be performed using the emergency key, or with approval by other technicians.
Device recovery
When encryption keys are lost, recovery can be performed using the emergency key, or with approval by other technicians.
Device compliance
Validate the compliance of devices using Android and iOS built-in security and signing certificates before granting access to idemeum portal.
Device compliance
Validate the compliance of devices using Android and iOS built-in security and signing certificates before granting access to idemeum portal.
Device compliance
Validate the compliance of devices using Android and iOS built-in security and signing certificates before granting access to idemeum portal.
Hardware backed storage
Mobile crypto keys are stored leveraging Strongbox or iOS security enclave on Android and iOS.
Hardware backed storage
Mobile crypto keys are stored leveraging Strongbox or iOS security enclave on Android and iOS.
Hardware backed storage
Mobile crypto keys are stored leveraging Strongbox or iOS security enclave on Android and iOS.
API key encryption
Even when enabling API integrations to perform automated actions on vault data, all encryption is performed with security API key that is not persisted in the cloud.
API key encryption
Even when enabling API integrations to perform automated actions on vault data, all encryption is performed with security API key that is not persisted in the cloud.
API key encryption
Even when enabling API integrations to perform automated actions on vault data, all encryption is performed with security API key that is not persisted in the cloud.
Compliance
SOC2 Type2
The SOC 2 Type 2 is an audit report performed by an independent third-party certified by the American Institute of Certified Public Accountants (AICPA) to evaluate a service organization's controls related to the Trust Services Criteria (TSC).
SOC2 Type 2

Compliance
SOC2 Type2
The SOC 2 Type 2 is an audit report performed by an independent third-party certified by the American Institute of Certified Public Accountants (AICPA) to evaluate a service organization's controls related to the Trust Services Criteria (TSC).
SOC2 Type 2

Compliance
SOC2 Type2
The SOC 2 Type 2 is an audit report performed by an independent third-party certified by the American Institute of Certified Public Accountants (AICPA) to evaluate a service organization's controls related to the Trust Services Criteria (TSC).
SOC2 Type 2

Infrastructure
Reliability
With robust uptime guarantees and multi-level redundancy, you can trust Idemeum will be there when you need it.
With robust uptime guarantees and multi-level redundancy, you can trust Idemeum will be there when you need it.
Enterprise infrastructure
We leverage AWS to build a world-class architecture and to ensure users that Idemeum is built for maximum business resilience.
Enterprise infrastructure
We leverage AWS to build a world-class architecture and to ensure users that Idemeum is built for maximum business resilience.
Enterprise infrastructure
We leverage AWS to build a world-class architecture and to ensure users that Idemeum is built for maximum business resilience.
Availability and failover
Idemeum keeps your data safe by having multiple zones for redundancy, have a comprehensive backup program, and regularly testing our disaster recovery and business continuity program.
Availability and failover
Idemeum keeps your data safe by having multiple zones for redundancy, have a comprehensive backup program, and regularly testing our disaster recovery and business continuity program.
Availability and failover
Idemeum keeps your data safe by having multiple zones for redundancy, have a comprehensive backup program, and regularly testing our disaster recovery and business continuity program.
Service status
Notion makes it transparent and easy with a real-time view of Notion’s availability through the status page.
Service status
Notion makes it transparent and easy with a real-time view of Notion’s availability through the status page.
Service status
Notion makes it transparent and easy with a real-time view of Notion’s availability through the status page.
