Trust & Security
Verifiable security for your SAP Business One environment. We prioritize data integrity and compliance without the enterprise friction.
Data Ownership & Residency
Customer source data remains in its original system and is never duplicated.
A1 does not copy, replicate, or persist SAP Business One tables outside the customer's original environment. All transactional and master data remains stored in its original system at all times.
A1 analyzes data in place and returns results without creating secondary databases, replicas, or shadow copies.
Processing Model
Only derived insights are processed outside the customer environment.
When external processing is required, A1 sends only derived outputs-such as aggregates, summaries, or risk indicators. Raw SAP tables, records, and source data are never transmitted outside the customer environment.
This model enables advanced analysis while keeping sensitive business data under customer control.
LLM Execution & Isolation
LLM execution runs in isolated, customer-controlled containers.
Language model execution occurs in isolated environments dedicated to each customer. These environments are not shared across tenants and can be deployed in customer-controlled or private cloud configurations.
Customer data is not used to train shared models and is not retained beyond execution.
Zero Trust Access Model
All access is verified under a Zero Trust model.
Every user, service, agent, and request must authenticate and be authorized before accessing data or executing actions. No component is implicitly trusted, regardless of location or network boundary.
Permissions are enforced consistently and aligned with SAP Business One roles and controls.
Auditability & Control
A1 maintains a full audit trail of system access and activity to support review, compliance, and governance requirements.
Customers retain full control over scope, permissions, and enabled capabilities at all times.
Built by SAP Business One and Security Experts
Yaniv Golden
SAP Business One Solution Architect
Deep experience designing, implementing, and extending SAP Business One environments across finance, operations, and partner-led deployments. Background includes SAP Business One SDK, DI API, Service Layer, and HANA-based implementations, with a focus on data integrity, governance, and real-world ERP constraints.
Elad Rave
Cybersecurity & Cloud Security Architect
Background in designing secure, enterprise-grade systems with an emphasis on Zero Trust access models, isolated execution environments, and compliance-driven architecture. Focused on ensuring customer data protection, access control, and auditability across cloud and hybrid deployments.
Compliance
SOC 2 inherited: SOC 2 controls inherited from Google Cloud Platform (GCP).
Infrastructure and core services are covered under Google Cloud Platform's SOC 2 Type II report.
Subprocessors
| Provider | Purpose | Location |
|---|---|---|
| Google Cloud Platform | Cloud Infrastructure & Hosting | USA |
| Firebase | Authentication & Frontend Hosting | USA |
Security Inquiries
Have specific security requirements or need to review our data processing agreement?