Security at Pre6

Your production data deserves enterprise-grade protection. Security isn't an afterthought, it's foundational to everything we build.

01

Governance

Security is embedded in our culture and operations. We take a defense-in-depth approach with multiple layers of protection.

Security-first culture across the organization
Defined access control and incident response policies
Least privilege access principles
Regular security training for all team members
02

Data Protection

Encryption at Rest

All data is encrypted using industry-standard AES-256 encryption before being stored.

Encryption in Transit

All communications use TLS 1.3, the latest transport layer security protocol.

Data Isolation

Customer data is logically separated. Your manufacturing data is isolated and never commingled.

Your data stays yours. Manufacturing data of customers is never used to train models or shared with third parties.

03

AI & Product Security

We build security into our products from day one with a secure software development lifecycle.

Regular vulnerability scanning and dependency audits
Security-focused code reviews
Model integrity verification
Secure deployment pipelines

Responsible AI

We are committed to transparency in how our AI processes your data. Our models go through comprehensive evals and other checks & balances, to perform at the precision needed for manufacturing needs.

04

Infrastructure Security

Cloudflare

Cloudflare Protection

Enterprise-grade edge security with DDoS protection, Web Application Firewall, and global CDN for performance and resilience.

Monitoring & Incident Response

Continuous logging and monitoring
Automated threat detection
Incident response procedures
Regular security assessments
05

Privacy & Data Ownership

Your data belongs to you. We are custodians, not owners.

You own your data always
Industry standard secure data handling practices
Clear data retention and deletion policies
Right to delete your data anytime

Have security questions?

We're happy to discuss our security practices in detail.

Contact Us