//

Security

Your data is protected.

Our platform is built on modern cryptography and secure infrastructure to protect your data. From document uploads to generated content, your data is protected by our Zero-Access Architecture.

Zero Knowledge

We never have access to your documents, analysis and generated data.

Encrypted in transit

No one can access or read your data while in transit.

Encrypted at rest

Data stored on our servers is all encrypted meaning without a decryption key, no one can read your data

Private Key Ownership

Decryption keys are stored encrypted based on your password. We've implemented a 2 security layer approach where the keys required to read your data are encrypted by your password itself.

//

Protection layers

Infrastructure Security

Secure Hosting

SOC2 compliant data centers

TLS Encryption

Enforced in-transit encryption

DDoS Mitigation

Automated network protection

Firewall Enforcement

Strict access policies

//

Human safety controls

Identity Verification & Access Control

We have implemented robust access control options that give you full control of who can read and edit your data. All data is encrypted separately for each of the users, meaning that sharing your documents with your colleagues does not reduce security protocols applied to all your data.

Full control over who has access

Audit logs for compliance and accountability

Full data retention control

Data retention policies

//

FAQ

Questions? We've got answers.

How is this different from ChatGPT or Gemini etc.?

How can I trust the output for audits and compliance?

What regulations and standards does Questtor cover?

What happens to my data?

I already have a QHSE software in place. Why do I need Questtor?

What types of work packages can Questtor complete?