Security at Falconer
Our customers trust us to keep their data secure, and it's a responsibility we take seriously. Our security-minded approach is reflected in how we design our product, policies, and procedures.
Visit our Trust Center
SOC 2 Type II Certified
Trust and security are core to our commitment to our customers. Our enterprise-grade security features and comprehensive audits ensure we're aligned to industry best practices.
Enterprise-grade security & privacy
We combine best practices in system architecture and internal processes to keep your data safe.
Single Sign On
Falconer relies on trusted SSO providers (Google, Github, Okta) for authentication.
Data Encryption
All customer data is encrypted at rest and in transit, using AES 256 bit encryption and TLS 1.2+.
Data Isolation
For enterprise customers, Falconer provides single-tenant and on-premise deployments in your own Virtual Private Cloud.
Strict permissions enforcement
Falconer agent makes sure that only resources users have access to are included in their responses.
Third-party cloud providers
Our cloud providers comply with industry-leading security practices and frameworks, including SOC 2, ISO 27001, and PCI DSS.
Bring your own key
For enterprise customers, Falconer supports bringing your own LLM keys for maximum privacy and working with the model providers you trust.
Frequently
Is my data secure with Falconer?
Yes. Falconer is built with enterprise-grade security from the ground up. We deploy on AWS infrastructure with automated backups, security group restrictions, and encrypted data storage. All data is stored in secure, isolated environments with strict access controls.
What compliance certifications does Falconer have?
Falconer is SOC 2 Type II certified. We work with Vanta for security and compliance management, and all team members complete mandatory security awareness training.
How does Falconer handle access control?
Falconer implements granular access controls at multiple levels:
Tenant isolation: Each organization's data is completely isolated from other customers.
Selective access controls: Control which workspaces and folders are accessible to Falconer.
User permissions: Manage who can view, edit, and publish documents within your organization.
Integration permissions: Granular control over which repositories, Slack channels, and other sources Falconer can access.
We follow a defense-in-depth approach with two-layer access control: route middleware redirects unauthorized users, and API procedures verify access permissions.
Where is my data stored?
All Falconer infrastructure runs on AWS, with automated backup and audit logs. This ensures the system's optimal security, resilience, and auditability.
Can I use my own AI model keys?
Yes. For Enterprise customers, Falconer supports bring-your-own-key (BYOK) for AI models, allowing you to use your own API keys for services like OpenAI or Anthropic. This ensures your AI interactions remain under your control and billing.
What deployment options are available?
Falconer offers flexible deployment models to meet your security requirements:
Cloud-hosted: Fully managed by Falconer on AWS infrastructure.
VPC deployment: Isolated single-tenant deployment within a managed Virtual Private Cloud.
Bring your own cloud: On premise deployments available for organizations with strict data residency requirements.
We work with customers to determine the right deployment model based on budget, and compliance and security needs.
How does Falconer protect sensitive information?
Falconer is designed to handle sensitive organizational knowledge securely:
Selective data ingestion: Choose exactly which repositories, documents, and channels Falconer can access.
No unauthorized access: Strict controls prevent access to data outside your approved scope.
Encrypted connections: All data transmission uses industry-standard encryption.
What security practices does Falconer follow?
Our security practices include:
SSO login: Required on all team accounts.
Security awareness training: Mandatory for all employees via Vanta.
Regular security reviews: Ongoing audits and compliance checks.
Secure development practices: Code review processes and automated security scanning.
Incident response: Documented procedures for security events.
Can I control what data Falconer accesses?
Absolutely. Falconer provides granular control over data access:
Repository-level control: Select specific GitHub repositories to connect.
Resource selection: Granularly choose which documents or folders from Notion, Confluence, or Google Drive you share with Falconer.
Channel filtering: Control which Slack channels Falconer can read.
Document-level permissions: Manage access to individual documents and collections.
You maintain full control over what information Falconer can access and process, and who among your workforce gets access to any resource.
How does Falconer handle authentication?
Falconer uses secure authentication mechanisms:
OAuth integration with your existing identity providers.
Session management via secure encrypted cookies.
Automatic credential rotation and secure token storage.
What happens to my data if I stop using Falconer?
You maintain ownership of your data at all times. If you choose to stop using Falconer, we provide:
Data export capabilities to retrieve your content.
Clear data deletion procedures upon request.
No vendor lock-in for your organizational knowledge.
How can I learn more about Falconer's security?
For detailed security discussions or to review our security documentation, please contact our support channels. We're happy to provide additional information about our security architecture, compliance roadmap, and specific controls relevant to your organization's requirements.