Security at Gamut

Last Updated: January 2026

Trust is our currency.

At Gamut Intelligence Lab, we understand that we are processing your most valuable asset: your Investment Thesis. Our platform is built on a "Security-First" philosophy, leveraging our patent-pending Defense-in-Depth architecture to ensure data integrity, isolation, and confidentiality.

SOC 2 Type II 99.9% Uptime SLA Tenant Isolation No Cross-Customer Training

1. Architectural Security (The "Iron Dome")

Unlike standard AI wrappers that blindly pass data to LLMs, Gamut employs a rigid, deterministic security layer before any inference occurs.

This Defense-in-Depth architecture ensures that malicious or compromised data never reaches our analysis engine, protecting both your investment decisions and our system integrity.

2. Data Privacy & Tenant Isolation

Your "Alpha" belongs to you. We have designed our system to prevent data leakage between workspaces.

💡 Why This Matters

For financial clients, Security = Privacy of Alpha. They don't just care about hackers; they care about competitors seeing their investment thesis. Our tenant isolation ensures that your proprietary investment strategies remain confidential and are never used to benefit other users.

3. Infrastructure & Encryption

We build on the shoulders of giants. Gamut Agent is deployed on Google Cloud Platform (GCP), inheriting the same security standards used by the world's largest financial institutions.

3.1. Encryption in Transit

All data transmission between your browser, our API, and our AI providers is encrypted via TLS 1.3 (Transport Layer Security):

3.2. Encryption at Rest

All persisted data (Memory Bank records, User Profiles, Deal Flow Pipeline) is encrypted at rest using AES-256 standards in our managed databases:

3.3. Google Cloud Platform Security

Our infrastructure benefits from Google's enterprise-grade security:

3.4. Vertex AI Security

We utilize Google Vertex AI for enterprise-grade inference, ensuring that data sent for analysis is handled according to Google's strict enterprise data governance policies (not consumer-grade data harvesting). Your data is processed in isolated, enterprise-compliant environments.

4. Access Control

5. Compliance and Certifications

5.1. SOC 2 Type II

Gamut Agent is SOC 2 Type II compliant, demonstrating our commitment to:

Our SOC 2 report is available to enterprise customers under NDA. Contact security@gamutagent.ai for access.

5.2. Data Protection Regulations

We comply with major data protection regulations:

6. Security Monitoring and Incident Response

We employ comprehensive security monitoring and maintain a defined incident response plan:

We commit to notifying affected users within 72 hours of discovering a data breach, as required by GDPR and other regulations.

7. Vulnerability Disclosure

We take security reports seriously. If you believe you have found a vulnerability in Gamut Agent, please report it immediately to security@gamutagent.ai. We appreciate the contributions of the security research community.

Please include:

We acknowledge responsible disclosures and may offer rewards for significant security findings. Please allow us time to fix the issue before public disclosure.

11. Contact Us

For security-related questions or concerns:

© 2026 Gamut Intelligence Lab. All Rights Reserved.