//
Security
Your data is protected.
Our platform is built on modern cryptography and secure infrastructure to protect your data. From document uploads to generated content, your data is protected by our Zero-Access Architecture.
Zero Knowledge
We never have access to your documents, analysis and generated data.
Encrypted in transit
No one can access or read your data while in transit.
Encrypted at rest
Data stored on our servers is all encrypted meaning without a decryption key, no one can read your data
Private Key Ownership
Decryption keys are stored encrypted based on your password. We've implemented a 2 security layer approach where the keys required to read your data are encrypted by your password itself.
//
Protection layers
Infrastructure Security
Secure Hosting
SOC2 compliant data centers
TLS Encryption
Enforced in-transit encryption
DDoS Mitigation
Automated network protection
Firewall Enforcement
Strict access policies
//
Human safety controls
Identity Verification & Access Control
We have implemented robust access control options that give you full control of who can read and edit your data. All data is encrypted separately for each of the users, meaning that sharing your documents with your colleagues does not reduce security protocols applied to all your data.
Full control over who has access
Audit logs for compliance and accountability
Full data retention control
Data retention policies
//
FAQ
Questions? We've got answers.
How is this different from ChatGPT or Gemini etc.?
How can I trust the output for audits and compliance?
What regulations and standards does Questtor cover?
What happens to my data?
I already have a QHSE software in place. Why do I need Questtor?
What types of work packages can Questtor complete?