Security & Compliance
You cannot build autonomous AI on a foundation that hallucinates and forgets. Exogram is the deterministic control plane that provides the strict cryptographic guardrails required for enterprise execution.
Infrastructure Security
Exogram is built on SOC2-compliant infrastructure. All data is encrypted at rest using AES-256 and in transit using TLS 1.3 or higher. We employ continuous vulnerability scanning and automated threat detection.
Cryptographic Verification
Exogram implements Layer 4 Action Admissibility via cryptographic state hashing. As AI transitions to autonomous entities operating within enterprise infrastructure, they require an immutable trust ledger. Exogram tokens act as this ledger, cryptographically signing actions to ensure zero capacity for unaccountable mutations.
Data Isolation
Enterprise and Pro tier data namespaces are strictly isolated. Meaning Engines evaluate similarity only within tenant-specific vector boundaries. Cross-tenant leakage is physically and logically prevented.
Vulnerability Reporting
We take security reports seriously. If you have discovered a vulnerability in the Exogram platform or MCP server, please report it to security[at]exogram.ai. We will acknowledge receipt within 24 hours.
Compliance Status (Q2 2026 Target)
- ○ SOC 2 Type II (In Progress)
- ○ ISO 27001 (In Progress)
- ● GDPR Compliant Data Export