Skip to content

Security

A claims document intelligence layer still needs enterprise controls

The forensic layer between submission and payment only works in insurance if the evidence, audit trail, and operating controls hold up under real governance review.

Evidence and review trail preservedRetention-aware by designBuilt for procurement and governance review

Security review lens

What procurement and risk teams usually need answered

1

How decisions stay explainable

Reviewers, investigators, and governance teams need to see why a file was escalated and what changed during review.

2

How rollout risk stays contained

The pilot path starts narrow on purpose so value and controls are proven before production dependency grows.

3

How data handling stays operationally sane

Retention, auditability, and role-based workflows matter just as much as model quality in insurer environments.

Security and compliance

Enterprise security posture

Australia-hosted option

Primary deployment target is AWS Sydney (ap-southeast-2) for Australian insurers.

Encrypted

At rest (AES-256) and in transit (TLS 1.3). KMS-backed key management.

Auditable

Every verification, flag, and decision is logged with timestamps, model versions, and reason codes.

Retention controls

Tenant-configurable retention periods. Deletion workflows and legal hold support.

Access controls

API key scoping, environment separation (test/live), rate limiting, and IP allowlists.

Compliance aware

Designed with APRA CPS 230 (operational resilience) and CPS 234 (information security) expectations in mind.

We prepare a security questionnaire pack for your review process.

What buyers care about

Explainable decisions

Adjusters and governance teams should be able to trace how a document moved from submission to review, including evidence, reason codes, and human overrides.

Contained rollout risk

The pilot path stays narrow on purpose: historical documents, evidence-first output, no forced production integration before value and controls are clear.

Security questions? We send a full questionnaire pack.

We know procurement needs detail. Contact us and we will send the security brief, architecture overview, and compliance position before the first call.