Greptile logo

Greptile Security Practices

At Greptile, we prioritize the security of your data. This page outlines our comprehensive security measures, including administrative, technical, and physical controls. For any security-related inquiries, please contact security@greptile.com. We're committed to responding promptly and addressing your concerns.

Secure Hosting and Flexible Architecture

Greptile offers both cloud-based and on-premises ("bring-your-own-cloud") solutions to meet diverse security needs.

Cloud-based Hosting: Leveraging Industry Leaders

Our cloud infrastructure is powered by Amazon Web Services (AWS), a leader in cloud security. Learn more about AWS security measures on their AWS Security website and AWS Compliance website.

We enhance our services with:

On-premises Solutions: Maximum Control

Our self-hosted option allows you to run Greptile in your own virtual private cloud (VPC) or behind your virtual private network (VPN), ensuring complete control over your infrastructure.

Customizable LLM Inference

Self-hosted customers can choose to use their own LLMs or integrate with existing solutions, providing flexibility and enhanced security.

Protecting Your Code

Greptile does not store customer code. We use vector embeddings for efficient processing, and any code access is temporary and secure. On-premises solutions ensure your code never leaves your controlled environment.

Robust Confidentiality and Security Measures

Strict Access Controls

We implement rigorous controls over employee access to customer data, with technical safeguards and audit policies in place to monitor and log all account access.

Data Retention and Deletion

Customers have full control over their data, with options for data return and deletion upon contract termination. We offer administrator-initiated deletion with rapid execution and thorough backup destruction.

Continuous Monitoring and Validation

SOC2 Type II Compliance

Greptile is SOC2 Type II compliant, demonstrating our commitment to maintaining the highest security standards. Contact security@greptile.com to request our compliance report.

Regular Security Audits

We conduct ongoing internal and external security assessments, including continuous automated scanning of our web platform, to ensure the integrity of our security practices.

Rigorous Personnel Practices

All Greptile employees undergo background checks and receive comprehensive security training to safeguard your data and maintain the confidentiality of our services.

For any additional security questions or to learn more about our practices, please don't hesitate to contact security@greptile.com. Your security is our priority, and we're here to address any concerns you may have.