Enterprise-grade security,
built into every answer.
Bear Creek AI recognizes that the confidentiality, integrity, and availability of your information are vital to your business. knowledgeXpert™ is SOC 2 Type I, ISO 27001:2022, and GDPR certified — backed by 62 documented controls, single-tenant deployment, end-to-end encryption, and a guarantee your data is never used to train public AI models.
Independently audited. Continuously monitored.
Bear Creek AI's security program is built on industry-recognized frameworks and independently verified by third-party auditors.
SOC 2 Type I
CertifiedISO 27001:2022
CertifiedISO 27001
CertifiedGDPR
CertifiedKnowledge publishers, partners & customers who trust Bear Creek AI
Clarion Technical
Defense in depth, audited end to end.
Our security program is structured around 62 documented controls spanning every layer of how we build, run, and govern knowledgeXpert™ — continuously monitored through Sprinto, not just checked at audit time.
Product Security · 3
How we keep the platform itself safe to use.
- Annual production system user review
- Documented vulnerability remediation process
- Centralized management of flaw remediation
Data Security · 13
How we protect, isolate, and govern your information.
- AES-256 encryption at rest
- Multi-factor authentication on critical systems
- Production database access restriction
- User privilege & access reviews
- Data backups with recovery testing
- Inventory of personal data (PII)
Network Security · 7
How traffic and connections are guarded at every hop.
- Default-deny firewall on production hosts
- HTTPS / TLS 1.2+for all transmissions
- Limit network connections to vetted infrastructure
- Centralized collection of security event logs
App Security · 2
How customers stay informed and how anomalies are surfaced.
- Conspicuous link to privacy notice
- Continuous monitoring for unauthorized activity
Endpoint Security · 3
How the devices accessing your data are kept clean and current.
- Anti-malware on all employee endpoints
- Endpoint security validation on remote devices
- Automatic session lock after 15 minutes inactivity
Corporate Security · 34
How our people, policies, and vendors are governed.
- Code of business conduct & policy acknowledgement
- New-hire and periodic security & privacy training
- Risk assessments & third-party criticality reviews
- CISO & CPO with assigned responsibilities
- Internal audit using Sprinto
- EU Representative & documented DPIAs
Three promises about your data.
Plain-language commitments. No legalese, no fine print, no hidden clauses.
Your documents are your competitive advantage. We're a tool you use — not a destination for your knowledge to leak out of.
Your data stays yours.
Your documents are never used to train public AI models, never shared with other customers, and never leave your isolated tenant. Full stop.
You control access.
Role-based permissions let you decide who sees what — down to specific knowledgeBases. Add, remove, or revoke users in seconds. Every action is logged.
You can leave with everything.
You can export your documents and data at any time. If you cancel, we delete your tenant within the timelines defined in your contract. No lock-in.
For your security team.
The specifics your IT, InfoSec, and procurement teams will ask about — in one place.
TLS 1.2+
All API and browser traffic encrypted end-to-end.
AES-256
Customer data and backups encrypted with managed keys.
Single-tenant logical isolation
Each customer's data is isolated — never co-mingled.
99.9% target SLA
Active monitoring, automated failover, and documented RTO/RPO.
SSO, RBAC, MFA
SAML/OIDC SSO available for enterprise plans. MFA enforced on critical internal systems. Quarterly access reviews.
15-minute session lock
Endpoints accessing critical systems auto-lock after inactivity.
US-based cloud infrastructure
Hosted on enterprise cloud infrastructure (Microsoft Azure and Koyeb) within US data centers.
Centralized event logs
Security events from all critical systems aggregated for review and alerting.
Sprinto-monitored
62 controls continuously monitored. Internal audits performed via Sprinto.
Automated, tested
Backups taken at relevant cadence and integrity-verified through periodic recovery testing.
CPO & EU Representative
Chief Privacy Officer assigned. EU Representative appointed for GDPR matters. Periodic DPIAs conducted.
How your data flows through knowledgeXpert™ .
A transparent walk-through of what happens to your documents at each stage.
Upload — encrypted on the way in
Documents are uploaded over TLS 1.2+directly to your isolated tenant. Files are scanned, indexed, and encrypted at rest with AES-256. Original documents stay intact — we never modify your source content.
Process — isolated to your tenant
Embeddings, indexing, and retrieval all happen inside your tenant boundary. Your content is never co-mingled with other customers and never used to train public foundation models. Internal access is logged, role-based, and reviewed quarterly.
Answer — cited and auditable
Every answer cites the exact document and page it came from. Queries, responses, and citations are logged in an immutable audit trail your admins can review at any time.
Delete — gone when you say so
You can delete documents, knowledgeBases, or your entire tenant at any time. Deletions cascade through indexes and backups within the timelines defined in your contract. We do not retain your data after termination.
Need our compliance documents?
Our Trust Center publishes 42 security policies and procedures, 62 documented controls, and our full subprocessor list. Public documents are available immediately; sensitive items (SOC 2 reports, ISMS Manual, etc.) can be requested with one click.
Visit Trust CenterRequest Documents- Information Security Policy & ISMS Manual
- Data Protection & Retention Policies
- Incident & Data Breach Notification Policies
- Business Continuity & Disaster Recovery Policy
- Vendor Management & Access Control Policies
- SDLC Procedure & Privacy By Design Policy
- Records of Processing Activities (ROPA)
Our subprocessors, in plain sight.
knowledgeXpert™ uses a small set of independently audited subprocessors to deliver the platform. Every vendor is vetted, contracted, and listed publicly — no surprises.
Microsoft Azure
IT infrastructure
Koyeb
IT infrastructure
MongoDB Atlas
Datastore provider
Pinecone
Vector database / IT infrastructure
OpenAI
Foundation models (no training on customer data)
Slack
Internal collaboration & productivity
Google Workspace
Identity & access management
Atlassian (Jira)
Internal development documentation
GitHub
Internal development software
Stripe
Payments & finance
Squarespace
Marketing site hosting
What customers and their security teams ask us.
Don't see your question? Reach our security team directly.
Built to pass procurement. Built to earn trust.
Whether you're a security team running a vendor review, or a leader who just wants the short answer — we' re ready to talk.

