Your privacy,
our priority.
Enterprise-grade protection, full data sovereignty, transparent compliance and thoughtful governance. Built into every layer of Langdock.
Learn more in our trust center
Certified for top‑tier data protection and governance.
ISO 27001: Certified to the global standard for information management.
SOC2 Type II: Independently audited to ensure secure, reliable data handling.
GDPR: Fully aligned with GDPR for strong data privacy and user protection.
No model training: Your data stays private and is never used to train AI models.
Flexible deployment options, all compliant with the strictest security requirements
Multi-tenant SaaS: Hosted via Microsoft Azure on servers inside the EU.
Single tenant SaaS: Dedicated deployment managed by Langdock.
Bring your own cloud: Dedicated deployment in your own cloud.

On-premise: Hosting on custom Kubernetes setups via Helm charts.
Trusted data foundations
EU hosting: The application and most models (configurable) are hosted entirely in the EU.
No training on customer data: Customer data is never used to train or improve AI models.
Encryption in transit and at rest: Data is encrypted using AES‑256 and TLS 1.2+.
Security architecture
Least‑privilege access: Access to data is limited to essential personnel only.
Defense‑in‑depth: Multiple layers of controls protect data across the platform.
Continuous refinement: Security controls are regularly updated to match evolving threats.
Hardened processing: Secure procedures govern data handling end‑to‑end.
Compliance and assurance
ISO 27001 certified: Langdock maintains certified information‑security controls.
SOC 2 Type II audited: Independent audits validate operational security.
GDPR compliant: Customers can exercise data rights and rely on consistent protection.
Independent penetration testing: Frequent independent third‑party penetration testing validates Langdock’s security posture.
Vendor and sub-processor reviews: Langdock regularly evaluates sub-processors for compliance and data‑handling standards.
Model usage and BYOK
Bring your own API keys: Use your own model provider keys for supported LLMs.
Unified API: Access multiple model providers through a single interface.
Governance and admin controls
Workspace‑level permissions: Admins manage settings and access across the organization.
Mirrored access permissions: Langdock reflects source‑tool permissions in integrations 1:1 for consistency.
Optional analytics: Usage analytics can be enabled or disabled at the workspace level.
Vendor transparency: Subprocessors are reviewed and published for visibility.
Built‑in monitoring: Monitoring systems help detect potential security threats.
Legal documents
Privacy policy
Data protection addendum (DPA)
Terms & conditions
Trusted by over 4,000 companies globally

FAQ
How does Langdock encrypt data?
All data is encrypted in transit using TLS 1.2+ and at rest using AES‑256. These industry‑standard controls ensure that customer information remains protected during processing and storage.
Is Langdock GDPR compliant?
Yes. Langdock provides mechanisms for exercising GDPR rights, applies consistent protection across all regions, and processes data according to GDPR requirements.
Where is Langdock hosted?
The entire application and most models (configurable) can be hosted in the EU. Organizations may also deploy Langdock in their own infrastructure for full control.
Does Langdock use our data to train AI models?
No. Customer data is never used to train or improve AI models.
What certifications does Langdock hold?
Langdock is ISO 27001 certified and SOC 2 Type II audited, with independent third‑party validation of its security and operational controls.
Does Langdock support bring your own API keys?
Yes. Customers can use their own model API keys for supported providers. Langdock also offers unified access to models through a single API.
How does Langdock monitor and secure its infrastructure?
The platform undergoes continuous vulnerability scanning, security monitoring, and independent penetration testing to ensure a strong and up‑to‑date security posture.
How does Langdock handle vendors and subprocessors?
Langdock regularly reviews subprocessors. All subprocessors must follow equivalent security standards.
What happens to our data when we stop using Langdock?
Customers can request deletion of their data at any time. Data is retained only as necessary to provide the service and is removed according to documented deletion procedures.