Maximum control in your infrastructure
For teams that must keep hosting, network, logs, and keys completely in their own hands — including integration into internal security and compliance processes.
Who is this for?
- Highly regulated environments, special network zones, potentially limited connectivity
- Organizations with internal platform teams (SRE/DevOps) preferring self-managed
- Cases where customer-side monitoring, logging, KMS/HSM, and patch processes are mandatory
What you achieve
- Full control over infrastructure, logs, network, IAM, and key management
- Anonymization as a building block in internal data pipelines
- Aligned with internal audit and change processes
What you get
Deployment Artifacts
Software/deployment artifacts and implementation guides (scope dependent).
Setup Support
Support for setup, presets, entities, and policy design.
Enablement Options
Optional: enablement, training, architecture workshops.
Built for scale
Deploy with enterprise-grade infrastructure. All components run on Debian Linux and support standard enterprise scaling patterns.
Horizontal Scaling
Add instances as demand grows. Stateless architecture allows seamless horizontal scaling across multiple nodes.
Load Balancer Ready
Works with HAProxy, NGINX, AWS ALB, Azure LB, or any L7 load balancer. Health check endpoints included.
Container Ready
Docker images available. Deploy on Kubernetes, Docker Swarm, or any container orchestrator.
PLATFORM
Debian Linux (12+)
SCALING
Horizontal & Vertical
HIGH AVAILABILITY
Active-Active Clustering
DEPLOYMENT
Bare Metal / VM / Container
What you handle
- Operations, updates/patches, monitoring
- Backups, security hardening
- Full control over your infrastructure
What we provide
- Product support (scope dependent)
- Implementation consulting
- Best practices and documentation
Integration with your governance
Your Governance
Embedding into your governance (SIEM, vulnerability management, etc.).
Your KMS/HSM
Customer-side KMS/HSM and access controls under your management.
API-first for internal systems
API-First
Designed for integration into internal systems and pipelines.
MCP Integration
MCP integration for AI toolchains under your control.
Optional capabilities
Image Anonymization
OCR-powered PII detection in images. Tesseract extracts text, Presidio detects entities, solid rectangles redact. Supports JPEG, PNG, TIFF, BMP, WebP, GIF.
Learn moreReversible Encryption
Use the Encrypt method with AES-256-GCM for controlled decryption. Re-identify data when authorized with your personal key.
Learn moreChrome Extension
Protect privacy when using ChatGPT, Claude, and Gemini. Real-time PII interception before prompts reach AI services.
Learn moreCommon questions
Depends on environment, IAM, and security controls. We provide guides and support.
Optional, as part of service agreements.
Need maximum control?
Request a technical workshop to discuss your infrastructure requirements and how self-managed deployment can work for you.