Security
Last updated: December 2025
Our Commitment to Security
Security isn't an afterthought at eLLMo AI - it's built into everything we do. We know you're trusting us with your business data, and we take that responsibility seriously.
This page explains the security measures we have in place to protect your information. We're always working to improve our security practices and stay ahead of potential threats.
Where Your Data Lives
We host eLLMo AI on enterprise-grade cloud infrastructure with multiple layers of security. Our services run in isolated private networks with restricted access. Our infrastructure providers maintain physical security, redundant power systems, and 24/7 monitoring at data centers that power major companies around the world.
Encryption
Data in Transit
When data moves between your device and our servers, it's encrypted using TLS (the same technology that secures online banking). This means:
- All web traffic uses HTTPS
- API communications are encrypted
- Database connections are secured
Data at Rest
When your data is stored, it's encrypted using industry-standard AES-256 encryption. This applies to:
- All database records
- Files stored in our systems
- Backup copies
Access Control
Authentication
We use secure authentication to make sure only authorized users can access accounts:
- Industry-standard authentication protocols
- Passwords are securely hashed (we can't see your actual password)
- Email verification for new accounts
- Secure session management
- Password reset functionality
Authorization
We make sure users can only access what they're supposed to:
- Data isolation: Your company's data is separated from other companies' data at the database level
- Role-based access: Different permission levels for admins, editors, and viewers
- API protection: Every API request checks that you're authorized to access the requested data
- Public API security: Our public APIs validate customer IDs and implement rate limiting for public endpoints
Network Security
We protect our network with multiple layers of security:
- Private networks: Our services run in isolated networks, not directly on the public internet
- Firewalls: Network-level rules that only allow necessary traffic
- Load balancing: Traffic is distributed securely with SSL/TLS encryption
- DDoS protection: AWS provides protection against distributed denial-of-service attacks
Application Security
We build security into our development process:
- Code reviews for all changes
- Automated security scanning
- Regular updates to dependencies
- Input validation to prevent common attacks
We also implement security headers that help protect against common web vulnerabilities.
Our API endpoints are protected with authentication, rate limiting, and input validation to prevent abuse.
Data Protection
Data Isolation
Your data is kept separate from other customers' data:
- Database-level policies: Policies ensure you can only see your own company's data
- Multi-tenant architecture: Proper isolation between companies at the application and database levels
- Event data separation: Analytics and events data are partitioned by company to maintain isolation
Backups
We regularly back up your data:
- Automated backups: Daily backups of all critical data
- Encrypted storage: All backups stored with encryption
- Point-in-time recovery: Support for point-in-time recovery capabilities
- Long-term retention: Event data archived with partitioning for long-term retention
Monitoring and Response
We continuously monitor our systems for security issues:
- Logging of security-relevant events
- Monitoring for unusual activity
- Tracking failed login attempts
- Audit logs for data access
If we detect a security issue, we have procedures in place to respond quickly, contain the threat, and notify affected users when necessary.
Third-Party Services
We work with trusted partners to provide eLLMo AI, including AI providers, cloud infrastructure providers, database services, authentication services, analytics tools, payment processors, and search services.
We only work with partners we trust, and we review their security practices. All third-party integrations are secured and monitored.
Keeping Things Updated
We stay on top of security updates:
- Regular scanning for known vulnerabilities
- Prompt patching when issues are found
- Keeping dependencies up to date
- Updating base images and infrastructure components
Reliability
We design our systems to be reliable:
- Multiple availability zones for redundancy
- Auto-scaling to handle traffic spikes
- Health checks and automatic failover
While we can't guarantee 100% uptime, we work hard to keep the service available and responsive.
Security Questions?
If you're an enterprise customer and need to complete a security questionnaire or have specific security questions, we're happy to help. Please contact us at hello@tryellmo.ai.
We can provide:
- Completed security questionnaires
- Information about our security practices
- Responses to specific security inquiries
Found a Security Issue?
If you discover a security vulnerability, please let us know responsibly:
- Email us at hello@tryellmo.ai with "Security Vulnerability" in the subject line
- Give us details about what you found
- Give us time to fix it before sharing publicly
- Don't access or modify data that isn't yours
We appreciate responsible disclosure and will work with security researchers to address issues promptly.
Questions?
If you have questions about security, we're here to help:
Email: hello@tryellmo.ai Website: https://www.tryellmo.ai
Learn More
For more information, check out our Privacy Policy and Terms & Conditions.