Security-First Architecture

Your data.
Your control.

Ansikt was built with privacy and security as foundational requirements, not afterthoughts.

Security-First Architecture

Every design decision prioritizes the protection of your data and the privacy of individuals in your photos.

Encryption in Transit and At Rest

All data is encrypted in transit using TLS 1.3. At-rest encryption is provided by our S3-compatible storage infrastructure using AES-256. Your images and face recognition data are protected at every step.

Face Recognition Data Isolation

Facial embeddings are stored separately from source images with additional access controls. Even if face data is accessed, it cannot reconstruct original photos.

Minimal Data Retention

Configurable retention policies with automatic purging. Set how long data is kept and let the system handle deletion automatically.

Continuous Improvement

We may use uploaded images to improve our face recognition models and algorithms. This helps us provide better accuracy and performance for all users.

Technical Specifications

Encryption

  • At rest: AES-256-GCM
  • In transit: TLS 1.3
  • Secure key management with industry-standard practices

Infrastructure

  • 100% EU-hosted data centers
  • No US cloud providers
  • Geographic redundancy within EU

Data Protection

Your data never leaves European jurisdiction.

100% EU-Hosted

All data stored in European data centers. No data transfers to the US.

No US Cloud Providers

We don't use AWS, Azure, or Google Cloud. Your data stays within EU-controlled infrastructure.

Data Sovereignty

Your data never leaves EU jurisdiction. Protected by EU privacy laws and regulations.

Role-Based Access Control

Granular permissions for different user types. Control who can search, view, export, or delete data.

SSO Integration

SAML 2.0 and OIDC support for enterprise authentication. Integrate with your existing identity provider.

Audit Logging

Complete activity logs for compliance reviews. Every search, view, and export is recorded with timestamps.

Session Management

Secure token-based authentication with automatic expiration. Sessions timeout after periods of inactivity.

Access Controls

Control who can access what. Enterprise-grade authentication and authorization built for organizations with strict security requirements.

GDPR Compliance Readiness

Designed from the ground up to support GDPR compliance.

15

Article 15

Right of Access

  • Complete search across all connected sources
  • Documented proof of comprehensive search
  • Exportable reports for regulatory responses
17

Article 17

Right to Erasure

  • Identify every photo of a data subject
  • Automated deletion workflows
  • Verification that deletion is complete
30

Article 30

Records of Processing

  • Built-in processing activity documentation
  • Automated record-keeping for facial recognition
  • Clear data flow mapping

Our Commitment

We're a privacy company. That means:

No Data Sharing

We never share your data with third parties.

Privacy-Focused Analytics

We don't use Google Analytics or Facebook pixels. Any analytics we use are privacy-focused and EU-hosted.

Transparent Practices

Clear documentation of what we do with your data.

Data Minimization

We collect only what's necessary and delete what we don't need.