Encryption
TLS 1.3 encrypted communication in transit. For sensitive at-rest data we recommend disk-level encryption (LUKS / cloud KMS).
Security is not a layer we bolted on — it is the ground every query, connection, and user walks over. Polybase is built on strong cryptography, granular access rules, and a full self-host option so the most sensitive teams can trust it. Run our cloud or your own infrastructure — control stays with you.
Six core principles — every user and every bit flows through them.
TLS 1.3 encrypted communication in transit. For sensitive at-rest data we recommend disk-level encryption (LUKS / cloud KMS).
Run Polybase on your own cloud or on-prem. A single Go binary, zero vendor lock-in.
Every collection and field is protected by API rules that evaluate user roles and team memberships.
Your entire workspace and its data can be backed up from a single file and moved to any region.
Message edits are recorded server-side as an immutable history. A general audit log panel is on the roadmap.
With self-host you decide where your data lives. Compliance with local data residency laws stays fully in your hands.
Every request passes four checkpoints: edge, identity, application, and data. A failure in one component never exposes the entire system — the layers reinforce each other.
To make this auditable, the full rule engine is exposed — your auditors can inspect the policies directly inside Polybase.
Reverse proxy and rate-limiting filter every request. WAF integration is on the roadmap.
Standard email/password and API token authentication. Enterprise SSO/SAML/SCIM/2FA on the roadmap, on request.
Role- and team-based API rules are evaluated on every read.
Row-level policy on PocketBase; regular backups; optional disk-level encryption.
We focus on principles over certifications: data minimization, explicit access rules, and full data control via self-host.
Designed around EU data protection principles; full data control with self-host.
Run on your own infrastructure with a single command; your data stays on your servers.
PocketBase API rules are open and auditable; your team can inspect policies directly.
Formal audit certifications are on the roadmap. We answer architecture questions on request.
Your data, on your servers
We answer your questions about architecture, deployment and security. You can request a tailored review for your team.