Security

Last updated: December 2025

Our Commitment to Security

Security isn't an afterthought at eLLMo AI - it's built into everything we do. We know you're trusting us with your business data, and we take that responsibility seriously.

This page explains the security measures we have in place to protect your information. We're always working to improve our security practices and stay ahead of potential threats.

Where Your Data Lives

We host eLLMo AI on enterprise-grade cloud infrastructure with multiple layers of security. Our services run in isolated private networks with restricted access. Our infrastructure providers maintain physical security, redundant power systems, and 24/7 monitoring at data centers that power major companies around the world.

Encryption

Data in Transit

When data moves between your device and our servers, it's encrypted using TLS (the same technology that secures online banking). This means:

  • All web traffic uses HTTPS
  • API communications are encrypted
  • Database connections are secured

Data at Rest

When your data is stored, it's encrypted using industry-standard AES-256 encryption. This applies to:

  • All database records
  • Files stored in our systems
  • Backup copies

Access Control

Authentication

We use secure authentication to make sure only authorized users can access accounts:

  • Industry-standard authentication protocols
  • Passwords are securely hashed (we can't see your actual password)
  • Email verification for new accounts
  • Secure session management
  • Password reset functionality

Authorization

We make sure users can only access what they're supposed to:

  • Data isolation: Your company's data is separated from other companies' data at the database level
  • Role-based access: Different permission levels for admins, editors, and viewers
  • API protection: Every API request checks that you're authorized to access the requested data
  • Public API security: Our public APIs validate customer IDs and implement rate limiting for public endpoints

Network Security

We protect our network with multiple layers of security:

  • Private networks: Our services run in isolated networks, not directly on the public internet
  • Firewalls: Network-level rules that only allow necessary traffic
  • Load balancing: Traffic is distributed securely with SSL/TLS encryption
  • DDoS protection: AWS provides protection against distributed denial-of-service attacks

Application Security

We build security into our development process:

  • Code reviews for all changes
  • Automated security scanning
  • Regular updates to dependencies
  • Input validation to prevent common attacks

We also implement security headers that help protect against common web vulnerabilities.

Our API endpoints are protected with authentication, rate limiting, and input validation to prevent abuse.

Data Protection

Data Isolation

Your data is kept separate from other customers' data:

  • Database-level policies: Policies ensure you can only see your own company's data
  • Multi-tenant architecture: Proper isolation between companies at the application and database levels
  • Event data separation: Analytics and events data are partitioned by company to maintain isolation

Backups

We regularly back up your data:

  • Automated backups: Daily backups of all critical data
  • Encrypted storage: All backups stored with encryption
  • Point-in-time recovery: Support for point-in-time recovery capabilities
  • Long-term retention: Event data archived with partitioning for long-term retention

Monitoring and Response

We continuously monitor our systems for security issues:

  • Logging of security-relevant events
  • Monitoring for unusual activity
  • Tracking failed login attempts
  • Audit logs for data access

If we detect a security issue, we have procedures in place to respond quickly, contain the threat, and notify affected users when necessary.

Third-Party Services

We work with trusted partners to provide eLLMo AI, including AI providers, cloud infrastructure providers, database services, authentication services, analytics tools, payment processors, and search services.

We only work with partners we trust, and we review their security practices. All third-party integrations are secured and monitored.

Keeping Things Updated

We stay on top of security updates:

  • Regular scanning for known vulnerabilities
  • Prompt patching when issues are found
  • Keeping dependencies up to date
  • Updating base images and infrastructure components

Reliability

We design our systems to be reliable:

  • Multiple availability zones for redundancy
  • Auto-scaling to handle traffic spikes
  • Health checks and automatic failover

While we can't guarantee 100% uptime, we work hard to keep the service available and responsive.

Security Questions?

If you're an enterprise customer and need to complete a security questionnaire or have specific security questions, we're happy to help. Please contact us at hello@tryellmo.ai.

We can provide:

  • Completed security questionnaires
  • Information about our security practices
  • Responses to specific security inquiries

Found a Security Issue?

If you discover a security vulnerability, please let us know responsibly:

  • Email us at hello@tryellmo.ai with "Security Vulnerability" in the subject line
  • Give us details about what you found
  • Give us time to fix it before sharing publicly
  • Don't access or modify data that isn't yours

We appreciate responsible disclosure and will work with security researchers to address issues promptly.

Questions?

If you have questions about security, we're here to help:

Email: hello@tryellmo.ai Website: https://www.tryellmo.ai

Learn More

For more information, check out our Privacy Policy and Terms & Conditions.