Security

Security

Our platform is built on modern cryptography and secure infrastructure to protect your data. From document uploads to generated content, your data is protected by our Zero-Access Architecture.




Zero-Access Architecture


We cannot read your data, by design.


  • Zero Knowledge: We never have access to your documents, analysis and generated data.

  • Encrypted in transit: No one can access or read your data while in transit.

  • Encrypted at rest: Data stored on our servers is all encrypted meaning without a decryption key, no one can read your data

  • Private Key Ownership: Decryption keys are stored encrypted based on your password. We've implemented a 2 security layer approach where the keys required to read your data are encrypted by your password itself.




Identity Verification & Access Control


We have implemented robust access control options that give you full control of who can read and edit your data. All data is encrypted separately for each of the users, meaning that sharing your documents with your colleagues does not reduce security protocols applied to all your data.




Infrastructure Security


  • Secure Hosting: SOC2 compliant data centers 

  • TLS Encryption: Enforced in-transit encryption

  • DDoS Mitigation: Automated network protection

  • Firewall Enforcement: Strict access policies




Human Safety Controls


  • Full control over who has access

  • Audit logs for compliance and accountability

  • Full data retention control

  • Data retention policies




Contact Us


If you have any questions about our security, please contact us at info@questtor.com

Frequently Asked Questions

How does Questtor prevent hallucinations?

Icon

Questtor uses advanced techniques like Retrieval-Augmented Generation (RAG) which grounds the product's results in verified information from our proprietary database. We also use other techniques such as, but not limited to: reverse prompting, chain of thought prompting, and re-inforcement learning.

What kind of gaps can Questtor detect?

Icon

How does Questtor ensure that every gap is detected?

Icon

How does Questtor understand my company's specific procedures and policies?

Icon

What happens to the data that I upload?

Icon

How does Questtor keep my data safe and secure?

Icon

How does Questtor prevent hallucinations?

Icon

Questtor uses advanced techniques like Retrieval-Augmented Generation (RAG) which grounds the product's results in verified information from our proprietary database. We also use other techniques such as, but not limited to: reverse prompting, chain of thought prompting, and re-inforcement learning.

What kind of gaps can Questtor detect?

Icon

How does Questtor ensure that every gap is detected?

Icon

How does Questtor understand my company's specific procedures and policies?

Icon

What happens to the data that I upload?

Icon

How does Questtor keep my data safe and secure?

Icon

No setup, no migration

Just 3 clicks to see results

No setup, no migration

Just 3 clicks to see results

No setup, no migration

Just 3 clicks to see results

Frequently Asked Questions

How does Questtor prevent hallucinations?

Icon

Questtor uses advanced techniques like Retrieval-Augmented Generation (RAG) which grounds the product's results in verified information from our proprietary database. We also use other techniques such as, but not limited to: reverse prompting, chain of thought prompting, and re-inforcement learning.

What kind of gaps can Questtor detect?

Icon

How does Questtor ensure that every gap is detected?

Icon

How does Questtor understand my company's specific procedures and policies?

Icon

What happens to the data that I upload?

Icon

How does Questtor keep my data safe and secure?

Icon

How does Questtor prevent hallucinations?

Icon

Questtor uses advanced techniques like Retrieval-Augmented Generation (RAG) which grounds the product's results in verified information from our proprietary database. We also use other techniques such as, but not limited to: reverse prompting, chain of thought prompting, and re-inforcement learning.

What kind of gaps can Questtor detect?

Icon

How does Questtor ensure that every gap is detected?

Icon

How does Questtor understand my company's specific procedures and policies?

Icon

What happens to the data that I upload?

Icon

How does Questtor keep my data safe and secure?

Icon