Security

Enterprise-grade security.
Your data, protected.

Your deal flow, portfolio data, and institutional intelligence are your competitive advantage. We treat them that way — with encryption, isolation, and complete audit trails.

Security Architecture

Built secure from day one.

Encryption Everywhere

Your data is encrypted at rest using AES-256 and in transit using TLS 1.3. We never store data unencrypted.

Single-Tenant Available

For enterprise deployments, we offer dedicated infrastructure with complete isolation from other customers.

Your Data Stays Yours

Data usage and model policy terms are defined per customer agreement. Your competitive intelligence remains firm-scoped.

Complete Audit Trails

Every query, action, and data access is logged with full attribution. Complete visibility for compliance.

Role-Based Access

Granular permission controls ensure team members only access what they need. Full admin governance.

Enterprise Infrastructure

Built on enterprise-grade cloud infrastructure with 99.9% uptime SLA and disaster recovery.

Compliance

Meeting the highest standards.

GDPR Compliant

Full compliance with EU data protection regulations

Data Residency

Choose where your data is stored and processed

Encrypted at Rest

AES-256 encryption for all stored data

Encrypted in Transit

TLS 1.3 for all data transmission

Access Controls

Role-based access with MFA support

Audit Logging

Complete audit trail for all operations

Capability Roadmap

Transparent posture today. Clear roadmap for tomorrow.

Live now

Governance foundation

Encryption, role-based access, audit logging, and GDPR-aligned controls are active.

In progress

Security review program

Formalized security review and third-party validation workflow is being expanded.

Roadmap

SOC 2 readiness

SOC 2 controls and evidence workflows are on the roadmap; timeline shared during enterprise diligence.

Our Commitments

Clear promises, kept.

We believe security is built on trust. Here are our commitments to you — in writing.

  • We never sell your data to third parties
  • Data usage and model policies are defined contractually
  • We never access your data without explicit permission
  • We immediately notify you of any security incidents
  • We provide complete data portability upon request
  • We delete your data upon contract termination
Zero Lock-In

If REMI disappears tomorrow, nothing breaks.

REMI is additive intelligence, not critical infrastructure. Your existing systems remain your source of truth.

Your Systems Stay Intact

Your Yardi keeps running. Your email works. Your spreadsheets work. REMI connects to these systems — it doesn't replace them.

Full Data Export

Export all your data at any time in standard formats. Every insight, every document, every piece of analysis — it's all yours to take.

We'll Help You Leave

If you decide REMI isn't right for you, we provide complete transition documentation and will even help you migrate to a competitor.

Exit Documentation

Your exit plan is documented before you start.

Counterintuitively, showing you how to leave builds trust that you'll want to stay. Here's exactly what we provide if you decide to move on.

Included in Every Contract

  • Complete data export in CSV, JSON, and PDF formats
  • All generated documents (memos, reports, analyses)
  • Knowledge graph export for continuity
  • Audit logs and activity history
  • 30-day post-termination access for transition
  • Technical documentation for data migration
  • Direct support from our team during transition

Human Approves Everything

REMI drafts. Humans approve. Every single time. REMI will never send an email, publish a report, or make a decision without a human clicking 'approve.'

Every IC memo requires human review
Every LP report needs explicit approval
Every alert can be dismissed or escalated
Complete audit trail of all approvals

Questions about security?

Our team is happy to walk through our security practices, answer questionnaires, and discuss enterprise deployment options.