Security

Built for sensitive environments.

Ix is designed for systems where data integrity, auditability, and isolation are non-negotiable.

01

Data isolation

Each tenant's world model is fully isolated. No cross-tenant data access. Graph storage is namespaced at the hardware level where required.

02

Deterministic provenance

Every ingestion event is cryptographically signed and stored immutably. Full audit trail from raw input to graph node — no silent mutations.

03

Private deployment

Ix can be deployed inside your infrastructure — no data leaves your environment. Available as a library, a container, or a managed deployment on your cloud.

04

Access control

Role-based access control on graph namespaces. API keys are scoped to read, write, or admin permissions. Webhook events are signed.

Compliance & certifications
SOC 2 Type II (in progress)GDPR compliant designPrivate deployment availableData residency controlsEnd-to-end encryptionZero-trust networking