AVA Trust Center

AVA maintains the security you already built by living in your cloud.

Architecture & Data Sovereignty AVA deploys privately within your own Azure (or AWS) tenant.

Your data never leaves your environment, and we don't extract any customer information outside of your tenant without explicit permission. Your existing data privacy agreements with Microsoft or AWS typically apply.

We suggest and can leverage external health alerts for support and application uptime, or keep that within your helpdesk. Different customers handle that differently depending on sensitivity. 

Architecture & Data Sovereignty AVA deploys privately within your own Azure (or AWS) tenant.

Your data never leaves your environment, and we don't extract any customer information outside of your tenant without explicit permission. Your existing data privacy agreements with Microsoft or AWS typically apply.

We suggest and can leverage external health alerts for support and application uptime, or keep that within your helpdesk. Different customers handle that differently depending on sensitivity. 

Architecture & Data Sovereignty AVA deploys privately within your own Azure (or AWS) tenant.

Your data never leaves your environment, and we don't extract any customer information outside of your tenant without explicit permission. Your existing data privacy agreements with Microsoft or AWS typically apply.

We suggest and can leverage external health alerts for support and application uptime, or keep that within your helpdesk. Different customers handle that differently depending on sensitivity. 

Architecture & Data Sovereignty AVA deploys privately within your own Azure (or AWS) tenant.

Your data never leaves your environment, and we don't extract any customer information outside of your tenant without explicit permission. Your existing data privacy agreements with Microsoft or AWS typically apply.

We suggest and can leverage external health alerts for support and application uptime, or keep that within your helpdesk. Different customers handle that differently depending on sensitivity. 

Security & Compliance

  • Entra ID authentication integrated with your existing identity provider, MFA, Conditional Access, etc.  

  • Role-based access controls inherited from your environment

  • All data encrypted at rest and in transit

  • We leverage your cloud provider's certified infrastructure (SOC 2, ISO 27001, etc.)

Access

  • We can leverage a customer based account for configuration assistance and smoke testing, but this is flexible depending on your process.  

  • Integrations use your credentials and respect your existing permissions, delegated in Entra as the standard.

Subprocessors

  • Microsoft Azure or (your infrastructure)

  • Anthropic / OpenAI (LLM providers—calls made from within your tenant)

Our goal is to keep all of your data in your tenant and connected apps unless customizations require otherwise.  Different customers prefer different access approaches, and we try to remain as flexible as possible.  

DataRM© All right reserved

DataRM© All right reserved