Security & Privacy

Zero-knowledge.
By design, not promise.

OTIS Intelligence is built on a principle that we should never be able to read your data — even if compelled. This is an architectural guarantee, not a policy statement.

We built OTIS so that
we cannot read your data

Every competitor in the SaaS management market holds your spending data on their servers. They can read it, analyse it across all their customers, and use it to build the benchmarks they sell back to the market.

OTIS is architecturally different. Your data is encrypted with a key generated in your browser, stored in your own cloud environment, and never transmitted to OTIS in readable form. The intelligence runs on our infrastructure — but it runs blind.

🔑

Client-generated encryption keys

Your 256-bit AES-GCM key is generated in your browser at activation and never transmitted to OTIS. Only you can decrypt your data.

☁️

Your storage, your environment

Connect Google Drive, OneDrive, S3, or your own server. Encrypted data lives where you choose — not on OTIS servers.

🔒

No-look processing

Analysis runs on your encrypted data in memory. OTIS processes without reading. Results are returned without storing.

🗑️

Full data purge on demand

Delete all data instantly. One request removes everything permanently. Confirmation ID issued for compliance records.

🇪🇺

GDPR by architecture

Because OTIS never holds identifiable data, GDPR obligations are minimal. Data residency is wherever your storage is.

Independent auditability

Technical architecture documentation available to your security team under NDA. The encryption chain is independently verifiable.

What OTIS can and cannot see

✓ What OTIS can see

Encrypted ciphertext blobs (unreadable without your key)
Aggregate benchmark data contributed anonymously
API call metadata (timestamps, response codes)
Your subscription and billing status

✗ What OTIS cannot see

Your vendor contracts or pricing
Your employee names or user data
Your financial transactions or invoice amounts
Your technology spend or budget information
Your findings, recommendations, or reports

Questions about
our security model?

We make our architecture documentation available to security teams under NDA. Contact us to discuss your requirements.

Contact our security team →