Security that matches your trust bar.

Tracefox ships with multi-tenant isolation, scoped API keys, and default query bounds to keep your data safe.

Tenant isolation

Every request enforces tenant and project scoping.

Data controls

Retention policies, usage caps, and export audits with ClickHouse-backed logs.

Compliance-ready

SOC2-aligned controls, audit trails, and security review support.

Security architecture, layered by design

Tracefox applies controls at ingest, storage, and query time so teams can trust every surface of the platform.

Ingestion Scoped API keys, rate limits, schema validation. OTLP validation + PII safeguards.
Storage Encryption at rest, retention policies, backups. Dedicated clusters for Enterprise.
Query + AI Bounded queries, cost previews, audit trails. Tenant-scoped AI copilot actions.
Data isolation flow

Guardrails at every layer

Controls are enforced at ingest, storage, and query time to keep tenant data isolated and auditable.

  • Scoped ingestion keys and rate limits
  • Encryption + retention policies
  • Bounded queries with audit logs

Platform protections

  • Scoped API keys for ingestion and admin access.
  • Bounded query defaults to prevent data spills.
  • Encryption in transit and at rest.
  • Dedicated VPC deployments for Enterprise.
  • Audit trails for alerting, changes, and AI summaries.

Security contact

Have a vulnerability report or security question?

Email security@tracefox.ai and our team will respond within one business day.

Need more? Visit our Trust Center.