SOC 2 Compliant
Applies when TrendsAGI is hosted in your environment with your controls, evidence, and monitoring processes.
Deploy TrendsAGI on your cloud, hybrid, or on-prem setup. Redundant storage, graph-based indexing, and sub-200 ms recall ensure your data stays fast, secure, and fully compliant.
Cloud, on-prem, or hybrid. Deploy wherever you need. Flexible, composable, and built for enterprise.
Recall Target
< 200 ms
Deployment Models
Cloud, Hybrid, On-Prem
Control Monitoring
24/7
Applies when TrendsAGI is hosted in your environment with your controls, evidence, and monitoring processes.
Supports lawful processing, data minimization, retention boundaries, and data-subject request handling.
Supports notice, access, deletion, and request workflows for California consumer privacy obligations.
SOC 2 Compliant applies when you host TrendsAGI code in your environment. The response path you receive is aligned to the open-source implementation published in our repository.
Open source repository| Control Domain | SOC 2 | GDPR | CCPA | Implementation |
|---|---|---|---|---|
| Identity & Access Governance | MFA, least privilege, scoped service identities | Role-scoped access to personal data | Authorized requester verification | SSO/SAML, RBAC, session hardening, immutable access logs |
| Data Lifecycle Governance | Classification, retention, secure deletion | Storage limitation and data minimization | Deletion fulfillment and confirmation records | Policy-based retention windows, deletion workflows, purge proof logs |
| Encryption & Key Management | Encryption in transit and at rest | Security of processing safeguards | Reasonable security procedures | TLS 1.2+, encrypted storage, tenant key boundaries |
| Audit & Monitoring | Continuous control monitoring and evidence | Accountability and processing records | Operational privacy traceability | Centralized logs, tamper-evident events, alert thresholds |
| Incident & Request Operations | Documented incident response lifecycle | Breach assessment and response process | Request SLA and governance | Runbooks, escalation policies, case tracking, response SLAs |
Need architecture details or a custom compliance mapping? Contact our team.