Trust & Security

Verifiable security for your SAP Business One environment. We prioritize data integrity and compliance without the enterprise friction.

Data Ownership & Residency

Customer source data remains in its original system and is never duplicated.

  • A1 does not copy, replicate, or persist SAP Business One tables outside the customer's original environment. All transactional and master data remains stored in its original system at all times.

  • A1 analyzes data in place and returns results without creating secondary databases, replicas, or shadow copies.

Processing Model

Only derived insights are processed outside the customer environment.

  • When external processing is required, A1 sends only derived outputs-such as aggregates, summaries, or risk indicators. Raw SAP tables, records, and source data are never transmitted outside the customer environment.

  • This model enables advanced analysis while keeping sensitive business data under customer control.

LLM Execution & Isolation

LLM execution runs in isolated, customer-controlled containers.

  • Language model execution occurs in isolated environments dedicated to each customer. These environments are not shared across tenants and can be deployed in customer-controlled or private cloud configurations.

  • Customer data is not used to train shared models and is not retained beyond execution.

Zero Trust Access Model

All access is verified under a Zero Trust model.

  • Every user, service, agent, and request must authenticate and be authorized before accessing data or executing actions. No component is implicitly trusted, regardless of location or network boundary.

  • Permissions are enforced consistently and aligned with SAP Business One roles and controls.

Auditability & Control

  • A1 maintains a full audit trail of system access and activity to support review, compliance, and governance requirements.

  • Customers retain full control over scope, permissions, and enabled capabilities at all times.

Built by SAP Business One and Security Experts

Yaniv Golden

SAP Business One Solution Architect

Deep experience designing, implementing, and extending SAP Business One environments across finance, operations, and partner-led deployments. Background includes SAP Business One SDK, DI API, Service Layer, and HANA-based implementations, with a focus on data integrity, governance, and real-world ERP constraints.

Elad Rave

Cybersecurity & Cloud Security Architect

Background in designing secure, enterprise-grade systems with an emphasis on Zero Trust access models, isolated execution environments, and compliance-driven architecture. Focused on ensuring customer data protection, access control, and auditability across cloud and hybrid deployments.

Compliance

  • SOC 2 inherited: SOC 2 controls inherited from Google Cloud Platform (GCP).

  • Infrastructure and core services are covered under Google Cloud Platform's SOC 2 Type II report.

Subprocessors

ProviderPurposeLocation
Google Cloud PlatformCloud Infrastructure & HostingUSA
FirebaseAuthentication & Frontend HostingUSA

Security Inquiries

Have specific security requirements or need to review our data processing agreement?