Who is this for?

  • Highly regulated environments, special network zones, potentially limited connectivity
  • Organizations with internal platform teams (SRE/DevOps) preferring self-managed
  • Cases where customer-side monitoring, logging, KMS/HSM, and patch processes are mandatory

What you achieve

  • Full control over infrastructure, logs, network, IAM, and key management
  • Anonymization as a building block in internal data pipelines
  • Aligned with internal audit and change processes

What you get

Deployment Artifacts

Software/deployment artifacts and implementation guides (scope dependent).

Setup Support

Support for setup, presets, entities, and policy design.

Enablement Options

Optional: enablement, training, architecture workshops.

Built for scale

Deploy with enterprise-grade infrastructure. All components run on Debian Linux and support standard enterprise scaling patterns.

Horizontal Scaling

Add instances as demand grows. Stateless architecture allows seamless horizontal scaling across multiple nodes.

Load Balancer Ready

Works with HAProxy, NGINX, AWS ALB, Azure LB, or any L7 load balancer. Health check endpoints included.

Container Ready

Docker images available. Deploy on Kubernetes, Docker Swarm, or any container orchestrator.

PLATFORM

Debian Linux (12+)

SCALING

Horizontal & Vertical

HIGH AVAILABILITY

Active-Active Clustering

DEPLOYMENT

Bare Metal / VM / Container

What you handle

  • Operations, updates/patches, monitoring
  • Backups, security hardening
  • Full control over your infrastructure

What we provide

  • Product support (scope dependent)
  • Implementation consulting
  • Best practices and documentation

Integration with your governance

Your Governance

Embedding into your governance (SIEM, vulnerability management, etc.).

Your KMS/HSM

Customer-side KMS/HSM and access controls under your management.

API-first for internal systems

API-First

Designed for integration into internal systems and pipelines.

MCP Integration

MCP integration for AI toolchains under your control.

Optional capabilities

Image Anonymization

OCR-powered PII detection in images. Tesseract extracts text, Presidio detects entities, solid rectangles redact. Supports JPEG, PNG, TIFF, BMP, WebP, GIF.

Learn more

Reversible Encryption

Use the Encrypt method with AES-256-GCM for controlled decryption. Re-identify data when authorized with your personal key.

Learn more

Chrome Extension

Protect privacy when using ChatGPT, Claude, and Gemini. Real-time PII interception before prompts reach AI services.

Learn more

Common questions

How complex is the setup?

Depends on environment, IAM, and security controls. We provide guides and support.

Is there support for upgrades?

Optional, as part of service agreements.

Need maximum control?

Request a technical workshop to discuss your infrastructure requirements and how self-managed deployment can work for you.