Skip to main content
Doclo

Security

Your documents. Your infrastructure. Your control.

Every Doclo deployment is designed around your security and compliance requirements. Documents never have to leave your environment.

Deployment Options

Deploy where your security team is comfortable

Four deployment models, all with the same capabilities. Your security requirements determine the architecture, not ours.

On-premise

Run the entire stack on your hardware. Documents are processed locally. Nothing leaves your network.

Air-gapped environments

Fully supported. No internet connectivity required after initial setup. Ideal for classified or regulated environments.

Your cloud account

Deploy to your AWS, GCP, or Azure account. We configure the infrastructure. You own and control it.

Hybrid

Mix deployment modes across departments. Sensitive documents stay on-premise while others route through cloud.

In Detail

Your data, your rules

How we handle documents, work with AI providers, and keep you in control.

This is handled on a case-by-case basis. We can build systems that only store documents for the time it takes to extract the data, typically less than a minute. We can also help set up zero-day retention agreements with third-party AI providers. For maximum control, we support fully on-premise, air-gapped deployments where documents never leave your infrastructure.

Open Source

Audit the code yourself

Our document processing engine is MIT-licensed. Your security team can review the source code, verify behavior, and run their own security assessment before any deployment begins.

The public repository is coming soon. In the meantime, we provide full repository access under NDA for security evaluations. This is the baseline for all of our engagements, and we customize to each client's needs, working directly with your internal IT security and IAM teams as required.

Request codebase access for your security review →

Compliance

Built for regulated industries

Healthcare, financial services, insurance, and government organizations trust us with their most sensitive documents. Since every deployment is bespoke, we tailor each system to your specific regulatory requirements.

HIPAA

We can execute a BAA and configure on-premise deployments so PHI never leaves your network, with automated audit trails for every document processed.

SOC 2

Encryption at rest and in transit, role-based access controls, and full activity logging are built into every deployment. We configure these to match your audit requirements.

GDPR

Data residency controls, processing agreements, and right-to-deletion support can be built into your deployment architecture based on your jurisdictional needs.

ISO 27001

We follow information security management best practices and can align deployments with your existing ISO 27001 certified environment.

Contact our team to discuss your specific compliance requirements and start your security review.

Need more detail for your security review?

We can provide architecture diagrams, data flow documentation, and answers to your security questionnaire.

Open

Source code, auditable

On-prem

Fully supported

Zero

Data retention

Full

Audit trail